An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than theirown rightful packet for enhancing network performance. It happens due to the availability of some selfish ormalicious nodes which do not cooperate in transmission of received packets to honest nodes, which totallyreduces the network performance. A fairness issue arises when a selfish/malicious node access the advantage ofthe honest nodes without providing their contributions to honest nodes which significantly degrades theperformance of network and May results in failure of entire communication. In this paper, we are analyzingnetwork performance by using Message Authentication Code (MAC) Based protocol which can identifymisbehaving / malicious nodes.MAC uses only fast symmetric cryptographic operations, making it suitable formulticast networks, where latency is an important factor. For its construction, we used an efficient keyassignment based on Blom’s scheme, and a Merkle tree to provide authenticity during our identification routine.Further, this scheme support addition of new nodes in to the existing network only after proper authentication isdone.
Authors and Affiliations
Mr. P. Vijaya Babu Varma , Mrs. Lavanya Pamulaparty , (CSE, Methodist College of Engineering & Technology/Osmania University, India)
Security Measures in Aodv for Ad Hoc Network
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move a...
“The Impact Of Incentives To Indigenous Farmers (A1 And A 2) In Maize Production In Zimbabwe” A Case Of Mashonaland East Province, Macheke, Zimbabwe.
Abstract: The current study was concerned with the need to establish incentives for farmers to boostproduction of maize in Macheke, Mashonaland East Province, in Zimbabwe. This study was motivated by anobservation that t...
[i][/i] Biometric-Based Authentication Model for E-Card Payment Technology
Abstract: The goals of this study were to develop and evaluate a model for acceptance of biometric-based access control for payment technologies used in commercial Banks. A wide diversity of systems requires reliab...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV Protocol
Wireless operations allow services, such as long-range communications, that are impossible or impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol  ...
DBET: Demand Based Energy efficient Topology for MANETs
Abstract: Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nod...