A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network acts as both the send er and the receiver. Nodes can communicate with each other by single hop, when they are in same communication range. Otherwise, it uses the multi hop to communicate by using the coordination of intermediate node to transmit the data. Unfortunately, it is vulnerable to various kinds of attack, because of open medium and wide distribution of mobile nodes. According to the properties of Mobile Ad hoc Network, it is not enough with only using the prevention mechanism. So, there is a need for detecting misbehaving node in order to secure Mobile Ad hoc Network. Aim of this paper is to classify the types of misbehavior and technique used for detecting this misbehaving node in the Mobile Ad hoc Network. Using these kinds of technique, it is easy to overcome the problems in Mobile Ad hoc Network and increase the security in Mobile Ad hoc Network.
Authors and Affiliations
S. V. Vithya , Deepa A. J.
A Survey on Administrative Policies in Rule- Based Access Control
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstan...
Genetic Approach to Find Optimal Moves for Prisoner Dilemma Game
The Prisoner‘s Dilemma, a simple two-person game invented by Merrill Flood & Melvin Dresher in the 1950s, has been studied extensively in Game Theory. Till now the work has been done to study the environment in which...
3D Password: A novel approach for more secure authentication
The melodramatic increase of computer usage has given rise to many security concerns. One major security concern is Authentication; process of validating who you are to who you claimed to be. Authentication provides more...
Performance Analysis of Optical Wireless Communication Channel Link at Various Bit Rates
Optical wireless communication systems have got more popularity in last few years due to its advantage over conventional radio frequency communication systems. This paper reports the effect of using NRZ and RZ modulation...
Handwritten Character Recognition with Feedback Neural Network
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition system...