Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
نویسندگان
چکیده
منابع مشابه
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security i...
متن کاملPerformance Evaluation for Detection of Malicious Nodes Using Svm in Manet
DOI: 10.5281/zenodo.59957 ABSTRACT Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table ...
متن کاملStable Clustering in MANET Using Nodes Link Time
A mobile ad hoc network (MANET) is a self configuring network of mobile devices connected by wireless links. In order to achieve stable clusters, the cluster-heads maintaining the cluster should be stable with minimum overhead of cluster re-elections. This work proposes selecting stable cluster heads using a modified Weighted Clustering Algorithm and combining it with Link Expiration Time calcu...
متن کاملA Clustering Approach for MANET Nodes Using Multiple Network Management Criteria
The authors propose an approach for clustering Mobile Ad Hoc Network (MANET) nodes utilizing a variety of criteria. The clustering approach builds upon the notion of hierarchical or clustered management for MANETs and identifies logical clusters of nodes. A binary relationship matrix between all network nodes is created for each criterion that displays the advantage of having two given nodes in...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Circuits and Systems
سال: 2016
ISSN: 2153-1285,2153-1293
DOI: 10.4236/cs.2016.78180