A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network acts as both the send er and the receiver. Nodes can communicate with each other by single hop, when they are in same communication range. Otherwise, it uses the multi hop to communicate by using the coordination of intermediate node to transmit the data. Unfortunately, it is vulnerable to various kinds of attack, because of open medium and wide distribution of mobile nodes. According to the properties of Mobile Ad hoc Network, it is not enough with only using the prevention mechanism. So, there is a need for detecting misbehaving node in order to secure Mobile Ad hoc Network. Aim of this paper is to classify the types of misbehavior and technique used for detecting this misbehaving node in the Mobile Ad hoc Network. Using these kinds of technique, it is easy to overcome the problems in Mobile Ad hoc Network and increase the security in Mobile Ad hoc Network.
Authors and Affiliations
S. V. Vithya , Deepa A. J.
A Comparative Study of cloud and mCloud Computing
Cloud Computing is one of the latest technology. It makes many changes in industry. It is a platform which includes technology, resources and infrastructure. It is a concept of sharing resources to achieve economical ben...
A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for ef...
Methodology and Analysis for Various SQL Injection Techniques
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...
A Systematic Survey report on Various Frameworks and Models for Verification of Choreography in SOA
Service- Oriented Architecture (SOA) is a mainstream strategy for improving IT performance. Web Services are self-contained internet enabled applications which are capable of performing business activities. Web Services...
An approach of curing Depression by Artificial Neural Networks(ANN) Approach with 5 Input Node Reviewing 3 Input Node
Psychologists have various medical ways to treat depression using counseling, medicines and much more. These ways do not guarantee that depression is totally cured. Depression affects the neurons in brain, decreasing the...