A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks

被引:0
|
作者
Sonekar, Shrikant V. [1 ]
Kshirsagar, Manali [1 ]
机构
[1] GH Raisoni Coll Engn, Dept CSE, Nagpur, MS, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
2ACK; ALOHA; CH; MANET; SN; CSMA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's one of the most interesting areas of research in wireless field is MANET. A Mobile Ad hoc Network (MANET) is a collection of nodes which are capable of communicating with each other through wireless links either directly or indirectly thorough routers. MANET is useful in so many crucial areas like in military application, disaster area etc. The nodes in the MANET can move anywhere in the network randomly. Due to its dynamic network topology it routing is a difficult task here. In present paper, we will see the method for detecting cluster head and malicious node then discuss how to overcome the problem of energy conservation. In next section the results and final section presents the conclusion and future scope.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 50 条
  • [21] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [22] Study on Selfish Node Incentive Mechanism with a Forward Game Node in Wireless Sensor Networks
    Al-Jaoufi, Mohammed Ahmed Ahmed
    Liu, Yun
    Zhang, Zhen-Jiang
    Uden, Lorna
    INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2017, 2017
  • [23] Trust Based Evaluation Model for Mitigating Selfish Nodes in Mobile Adhoc Networks
    Selvakumar, M.
    Madhavan, P.
    Sudhakar, B.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 145 - 149
  • [24] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    Wireless Personal Communications, 2019, 108 : 2117 - 2135
  • [25] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Ismail, Asima
    Amin, Rashid
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2117 - 2135
  • [26] Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
    Valluri, Bhanu Priyanka
    Sharma, Nitin
    Measurement: Sensors, 2024, 36
  • [27] Policy based data access in wireless adhoc networks
    Memon, Qurban A.
    SoftCOM 2006: International Conference on Software, Telecommunications and Computer Networks, 2006, : 112 - 116
  • [28] FCO - Fuzzy constraints applied Cluster Optimization technique for Wireless AdHoc Networks
    Mohammed, Amin Salih
    Balaji, Saravana B.
    Basha, Saleem M. S.
    Asha, P. N.
    Venkatachalam, K.
    COMPUTER COMMUNICATIONS, 2020, 154 : 501 - 508
  • [29] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
    Guo, Yongan
    Tang, Xinyu
    Sun, Hongbo
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
  • [30] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559