AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it may induce unrelated information. The presence of false date will not let to produce accurate result during query processing. In this paper, an attempt is made to discover the nodes that are malicious in nature, there are two ways of attack is possible one in Data Replacement Attack (DRA) and another one is False Notification Attack (FNA).In the first case one or more nodes will induce unrelated information in to the network, in second case the trusted node will send false information to the network. The proposed method detects these attacks by using score values in top k query processing, in which nodes reply with data items and their score value are used to identify the data replacement attack in network. After detecting the attack based on the malicious node information query issue node group the node in order to identify the false notification attack in network, which improves the accuracy of top k result for malicious node identification in MANET.
Authors and Affiliations
Venkatesh Babu S, Kezi Selva Vijila C
SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY
Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight...
ROBUST SCENE TEXT RECOGNITION WITH SPARSE BELIEF PROPAGATION
Content-based image analysis task requires text detection in natural scene images. The character candidates in text detection on minimizing regularized variations termed as Maximally Stable Extremely Regi...
GREEN CLOUD COMPUTING FOR AUCTION BASED RESOURCE ALLOCATION
Cloud computing is rising as a paradigm for large-scale data-intensive applications. Cloud infrastructures allows users to remotely access computing power and information over the net. Besides the large economic im...
Event Driven Plasticity Model for Analyzing Activities through Eye Blink and Classical Conditions
Human proficiency in dealing with alternative dynamic circumstances and accomplishment of uninterrupted different tasks in usually non-stationary atmospheres has got the neuroscientists’ attention to realize the mechanis...
ENERGY ALERT SECURE ROUTING PROTOCOL FOR IMPROVING QOS IN WIRELESS MEDICAL SENSOR NETWORK
The security and privacy protection of the collected data is a major unsolved issue, with challenges coming from stringent resource constraints of MSN devices, and the high demand for both s...