Improved Reliable Based Node Classification Using Dissect Method in Mobile AD HOC Network

نویسندگان

  • Mr. N. SENTHIL KUMARAN
  • M. Phil
  • R. MOHANA PRIYA
چکیده

620 www.ijergs.org Improved Reliable Based Node Classification Using Dissect Method in Mobile AD HOC Network Mr. N. SENTHIL KUMARAN, M.C.A. , M.Phil., R.MOHANA PRIYA, ASSISTANT PROFESSOR & HEAD, M.PhilFULL TIME RESEARCH SCHOLAR, DEPARTMENT OF COMPUTER APPLICATION, DEPARTMENT OF COMPUTER SCIENCE, VELLALAR COLLEGE FOR WOMEN, ERODE, INDIA. VELLALAR COLLEGE FOR WOMEN, ERODE, INDIA. [email protected] [email protected], 9789692346 Abstract— Certificate Revocation mechanisms play an important role in securing a network[6]. Malicious nodes directly threaten the robustness of the network Malicious nodes directly threaten the robustness of the network as well as the availability of nodes. Protecting legitimate nodes from malicious attacks must be considered in MANETs [1]. The main challenge for certificate revocation is to revoke the certificates of malicious nodes promptly and accurately. In this paper additionally uses two concepts: They are fixed window model and sliding window model of which the latter produces the best output with slight increased calculation overhead. In monitoring-based intrusion detection, each node monitors the forwarding behavior of its neighboring nodes. In this paper, proposed scheme is based upon a improved reliable based node classification scheme, which outperforms other techniques in terms of being able to quickly revoke attacker‘s certificates and recover falsely accused certificates. Keywords—Mobile Ad Hoc Networks, False Positive, False Accusation, Malicious Node, Intrusion Detection, Certificate Authority

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Estimating Reliability in Mobile ad-hoc Networks Based on Monte Carlo Simulation (TECHNICAL NOTE)

Each system has its own definition of reliability. Reliability in mobile ad-hoc networks (MANET) could be interpreted as, the probability of reaching a message from a source node to destination, successfully. The variability and volatility of the MANET configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate. It is because, no single structure or configurat...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014