A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks

被引:0
|
作者
Sonekar, Shrikant V. [1 ]
Kshirsagar, Manali [1 ]
机构
[1] GH Raisoni Coll Engn, Dept CSE, Nagpur, MS, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
2ACK; ALOHA; CH; MANET; SN; CSMA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's one of the most interesting areas of research in wireless field is MANET. A Mobile Ad hoc Network (MANET) is a collection of nodes which are capable of communicating with each other through wireless links either directly or indirectly thorough routers. MANET is useful in so many crucial areas like in military application, disaster area etc. The nodes in the MANET can move anywhere in the network randomly. Due to its dynamic network topology it routing is a difficult task here. In present paper, we will see the method for detecting cluster head and malicious node then discuss how to overcome the problem of energy conservation. In next section the results and final section presents the conclusion and future scope.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 50 条
  • [31] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [32] Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks
    Lim, Sung Yul
    Choi, Yoon-Hwa
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2013, 2 (01): : 70 - 84
  • [33] Adoption of Cognition for Malicious Node Detection in Homogeneous and Heterogeneous Wireless Networks
    Sunilkumar, G.
    Shivaprakash, K.
    Thriveni, J.
    Venugopal, K. R.
    Patnaik, L. M.
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 36 - 41
  • [34] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [35] Defending against Packet Dropping attacks in Wireless Adhoc Networks using Cluster based Trust Entropy
    Kanthimathi, S.
    Rani, Jhansi P.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2447 - 2452
  • [36] Probabilistic evidence aggregation for malicious node position bounding in wireless networks
    Laurendeau, Christine
    Barbeau, Michel
    Journal of Networks, 2009, 4 (01) : 9 - 18
  • [37] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [38] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [39] Throughput Capacity of Selfish Wireless Ad Hoc Networks with General Node Density
    Liu, Qiuming
    Luo, Yong
    Ling, Yun
    Zheng, Jun
    INFORMATION, 2016, 7 (01)
  • [40] Selfish Node Detection IDSM Based Approach Using Individual Master Cluster Node
    Veeraiah, Neenavath
    Krishna, B. T.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 427 - 431