AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6

Abstract

The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it may induce unrelated information. The presence of false date will not let to produce accurate result during query processing. In this paper, an attempt is made to discover the nodes that are malicious in nature, there are two ways of attack is possible one in Data Replacement Attack (DRA) and another one is False Notification Attack (FNA).In the first case one or more nodes will induce unrelated information in to the network, in second case the trusted node will send false information to the network. The proposed method detects these attacks by using score values in top k query processing, in which nodes reply with data items and their score value are used to identify the data replacement attack in network. After detecting the attack based on the malicious node information query issue node group the node in order to identify the false notification attack in network, which improves the accuracy of top k result for malicious node identification in MANET.

Authors and Affiliations

Venkatesh Babu S, Kezi Selva Vijila C

Keywords

Related Articles

REAL TIME SECTIONALIZATION OF ENHANCED SHARPNESS VIDEO USING FPGA

Background Identification is a general feature in many video privilege systems. Gaussian Mixture Models (GMM) is one of the popular fashionable and winning approaches to complete Background identification...

ND-MPR protocol for achieving delay free transmission in MANET

The MANET have the tendency to provide the end to end reliable path and multipath routing. It is important to provide reliable connection for sending data to destination in Mobile Adhoc Network. For achieving better Qo...

ANALYSIS OF BLOOD VESSEL CLASSIFICATION ALGORITHM ON RETINAL IMAGE USING C++

The proposed work is an automated system for the detection of Glaucoma which is done by using the algorithms CDR and ISNT ratio of a retinal fundus image. In general for the Glaucoma patient the s...

Similarity Measurement Of Web Navigation Pattern Using K-Harmonic Mean Algorithm

we present a new method to improve the web Navigation Usage Pattern to discover the web data based on similarity between two cluster points. The web usage patterns can be extracted from Web server logs regularly verified...

PERFORMANCE ANALYSIS OF K-MEANS ALGORITHMS IN WEBLOG DATA

Web mining is used to discover interest patterns which can be applied to many real world problems like refining web sites, better understanding the user behavior, product approval etc. Data mining sof...

Download PDF file
  • EP ID EP369362
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

Venkatesh Babu S, Kezi Selva Vijila C (2016). AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS. Elysium Journal of Engineering Research and Management, 4(6), -. https://europub.co.uk/articles/-A-369362