An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than theirown rightful packet for enhancing network performance. It happens due to the availability of some selfish ormalicious nodes which do not cooperate in transmission of received packets to honest nodes, which totallyreduces the network performance. A fairness issue arises when a selfish/malicious node access the advantage ofthe honest nodes without providing their contributions to honest nodes which significantly degrades theperformance of network and May results in failure of entire communication. In this paper, we are analyzingnetwork performance by using Message Authentication Code (MAC) Based protocol which can identifymisbehaving /  malicious nodes.MAC uses only fast symmetric cryptographic operations, making it suitable formulticast networks, where latency is an important factor. For its construction, we used an efficient keyassignment based on Blom’s scheme, and a Merkle tree to provide authenticity during our identification routine.Further, this scheme support addition of new nodes in to the existing network only after proper authentication isdone.

Authors and Affiliations

Mr. P. Vijaya Babu Varma , Mrs. Lavanya Pamulaparty , (CSE, Methodist College of Engineering & Technology/Osmania University, India)

Keywords

Related Articles

 Security Measures in Aodv for Ad Hoc Network

 Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move a...

“The Impact Of Incentives To Indigenous Farmers (A1 And A 2) In Maize Production In Zimbabwe” A Case Of Mashonaland East Province, Macheke, Zimbabwe.

Abstract: The current study was concerned with the need to establish incentives for farmers to boostproduction of maize in Macheke, Mashonaland East Province, in Zimbabwe. This study was motivated by anobservation that t...

[i][/i] Biometric-Based Authentication Model for E-Card Payment Technology

 Abstract: The goals of this study were to develop and evaluate a model for acceptance of biometric-based access control for payment technologies used in commercial Banks. A wide diversity of systems requires reliab...

 Detecting Good Neighbor Nodes and Finding Reliable Routing  Path Based on AODV Protocol

 Wireless operations allow services, such as long-range communications, that are impossible or impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol &nbsp...

 DBET: Demand Based Energy efficient Topology for MANETs

 Abstract: Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nod...

Download PDF file
  • EP ID EP152853
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Mr. P. Vijaya Babu Varma, Mrs. Lavanya Pamulaparty, (CSE, Methodist College of Engineering & Technology/Osmania University, India) (2014).  An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 1-7. https://europub.co.uk/articles/-A-152853