A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM

Abstract

There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network acts as both the send er and the receiver. Nodes can communicate with each other by single hop, when they are in same communication range. Otherwise, it uses the multi hop to communicate by using the coordination of intermediate node to transmit the data. Unfortunately, it is vulnerable to various kinds of attack, because of open medium and wide distribution of mobile nodes. According to the properties of Mobile Ad hoc Network, it is not enough with only using the prevention mechanism. So, there is a need for detecting misbehaving node in order to secure Mobile Ad hoc Network. Aim of this paper is to classify the types of misbehavior and technique used for detecting this misbehaving node in the Mobile Ad hoc Network. Using these kinds of technique, it is easy to overcome the problems in Mobile Ad hoc Network and increase the security in Mobile Ad hoc Network.

Authors and Affiliations

S. V. Vithya , Deepa A. J.

Keywords

Related Articles

Computational Morphology and Natural Language Parsing for Indian Languages: A Literature Survey

Computational Morphology and Natural Language Parsing are the two important as well as essential tasks required for a number of natural language processing application including machine translation. Developing well fledg...

A Multi-hop approach for sensing coverage in wireless sensor network

Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied widely and usefully applied in many applications like military surveillance, environmental monitorin...

Rules Reduction Using Decision Matrix

The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...

PCB Defect Detection Using Image Enhancement

Printed circuit board (PCB) mechanically supports and electrically connects electronic components using conductive tracks. Using PCB chances of miswriting or short circuited wiring are minimized .The location of electron...

Using Queuing theory the performance measures of cloud with infinite servers

Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...

Download PDF file
  • EP ID EP88975
  • DOI -
  • Views 153
  • Downloads 0

How To Cite

S. V. Vithya, Deepa A. J. (2014). A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM. International Journal of Computer Science & Engineering Technology, 5(10), 969-977. https://europub.co.uk/articles/-A-88975