International Journal of Intellectual Advancements and Research in Engineering Computations Attack Resistant Query Processing Framework for MANET

نویسنده

  • Kavin Kumar
چکیده

The mobile ad-hoc networks (MANET) are temporary wireless networks. Emergency and rescue operations are supported with MANET environment. Data values in a mobile node can be shared with all the nodes in the network. The query values are issued for the shared data access. The intermediate nodes retransmit the query and its response values to other nodes. Different routing schemes can be adapted to transfer the query and response values. All the MANET applications are designed with the consideration of the limited battery power and bandwidth levels. Data provider node maintains the data items for query process. The query-issuing node foods a query over the entire network. The K-data items are replied with highest score values with multiple routes. Data Replacement Attacks are initiated to change the data items in query reply. The queryissuing node tries to detect attacks from the information attached to the reply messages. The malicious nodes are identified with the message communication with other nodes. Multiple malicious nodes can not be identified using a single query value. Malicious node information are shared with other nodes. All the nodes are divided into groups. Malicious nodes are identified with the information collected from the groups. The attacks are discovered with reply route details. Local and global identification methods are adapted for the malicious node detection process. The MANET data sharing scheme is designed to access the shared data with security. The mobile ad-hoc network nodes are grouped as clusters with reference to its coverage and resource levels. Cluster based malicious node discovery process is performed in the system. Liar node and False Notification Attack (FNA) discovery mechanisms are integrated with the system. Message authentication methods are integrated to control malicious nodes. Data confidentiality and integrity verification schemes are combined in the message authentication mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Numerical Simulation of a Lead-Acid Battery Discharge Process using a Developed Framework on Graphic Processing Units

In the present work, a framework is developed for implementation of finite difference schemes on Graphic Processing Units (GPU). The framework is developed using the CUDA language and C++ template meta-programming techniques. The framework is also applicable for other numerical methods which can be represented similar to finite difference schemes such as finite volume methods on structured grid...

متن کامل

Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

متن کامل

Parleda: a Library for Parallel Processing in Computational Geometry Applications

ParLeda is a software library that provides the basic primitives needed for parallel implementation of computational geometry applications. It can also be used in implementing a parallel application that uses geometric data structures. The parallel model that we use is based on a new heterogeneous parallel model named HBSP, which is based on BSP and is introduced here. ParLeda uses two main lib...

متن کامل

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017