AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6

Abstract

The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it may induce unrelated information. The presence of false date will not let to produce accurate result during query processing. In this paper, an attempt is made to discover the nodes that are malicious in nature, there are two ways of attack is possible one in Data Replacement Attack (DRA) and another one is False Notification Attack (FNA).In the first case one or more nodes will induce unrelated information in to the network, in second case the trusted node will send false information to the network. The proposed method detects these attacks by using score values in top k query processing, in which nodes reply with data items and their score value are used to identify the data replacement attack in network. After detecting the attack based on the malicious node information query issue node group the node in order to identify the false notification attack in network, which improves the accuracy of top k result for malicious node identification in MANET.

Authors and Affiliations

Venkatesh Babu S, Kezi Selva Vijila C

Keywords

Related Articles

ENHANCING LOAD SHARING (ELShare) METHOD IN MOBILE CLOUD COMPUTING ENVIRONMENT

With uptrend of smartphones and an increasing number of services are provided by cloud computing. In mobile cloud computing (MCCs), a mobile user is integrated with a cloud server through a network gate...

AN EFFICIENT AND SECURE POLICY UPDATE OUTSOURCING SCHEME FOR BIG DATA STORAGE IN CLOUD

Store the big data in cloud is a best and an effective option due to its high volume and velocity. Generally, the cloud has the capability to store the big data and to process the high volume of user access requests. In...

GEO-DISTRIBUTED MAP REDUCE FRAMEWORK FOR COST EFFICIENT BIG DATA ANALYSIS

Big data analysis is one of the major challenges of current era. The limits to what can be done are often times due to how much data can be processed in a given time-frame Implementation of map reduce framework in Hadoop...

FiDoop: Parallel Mining of Frequent Item sets Using MapReduce

Due to the exponential increase of real-time data monitoring systems, the extraction of frequent item (Frequent item set mining) set from large uncertain database is the challenging task. The existing parallel mining alg...

AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS

The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...

Download PDF file
  • EP ID EP369362
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

Venkatesh Babu S, Kezi Selva Vijila C (2016). AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS. Elysium Journal of Engineering Research and Management, 4(6), -. https://europub.co.uk/articles/-A-369362