A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks

被引:0
|
作者
Sonekar, Shrikant V. [1 ]
Kshirsagar, Manali [1 ]
机构
[1] GH Raisoni Coll Engn, Dept CSE, Nagpur, MS, India
关键词
2ACK; ALOHA; CH; MANET; SN; CSMA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's one of the most interesting areas of research in wireless field is MANET. A Mobile Ad hoc Network (MANET) is a collection of nodes which are capable of communicating with each other through wireless links either directly or indirectly thorough routers. MANET is useful in so many crucial areas like in military application, disaster area etc. The nodes in the MANET can move anywhere in the network randomly. Due to its dynamic network topology it routing is a difficult task here. In present paper, we will see the method for detecting cluster head and malicious node then discuss how to overcome the problem of energy conservation. In next section the results and final section presents the conclusion and future scope.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 50 条
  • [1] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    V. Gomathy
    Neelamadhab Padhy
    Debabrata Samanta
    M. Sivaram
    Vishal Jain
    Iraj Sadegh Amiri
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4995 - 5001
  • [2] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [3] Detection of Malicious Route in Wireless Adhoc Networks
    Malhotra, Amarjit
    Kirtani, Saurabh
    Agarwal, Tushar
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 94 - 97
  • [4] Selfish Node Detection in Wireless Mesh Networks
    Bin Muhaya, Fahad T.
    Fazl-E-Hadi
    Naseer, Atif
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 284 - 288
  • [5] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    L. Gandhimathi
    G. Murugaboopathi
    Wireless Personal Communications, 2021, 117 : 1209 - 1222
  • [6] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    Gandhimathi, L.
    Murugaboopathi, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1209 - 1222
  • [7] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [8] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
    Ramasamy, Lakshmana Kumar
    Khan, Firoz K. P.
    Imoize, Agbotiname Lucky
    Ogbebor, Joshua O.
    Kadry, Seifedine
    Rho, Seungmin
    IEEE ACCESS, 2021, 9 : 128765 - 128785
  • [9] An Efficient Energy based Detection of Malicious Node in Mobile Wireless Sensor Networks
    Sharmila S.
    Umamaheswari G.
    Journal of The Institution of Engineers (India): Series B, 2012, 93 (1) : 25 - 30
  • [10] Optimal malicious agreement protocol for cluster-based wireless sensor networks
    Yan, Kuo-Qin
    Wang, Shu-Ching
    Peng, Chin-Shan
    Wang, Shun-Sheng
    SCIENCEASIA, 2014, 40 : 8 - 15