Performance Analysis of Malicious nodes on Multi hop Cellular Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 7

Abstract

The existence of malicious nodes in multi hop cellular networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. In this paper we proposed some approaches to analysis the consequences caused by malicious nodes in networks. We analyzed and reported the simulation result, that the effect on performance of network when malicious node present in it. Based on our past report on the behavior of all nodes we will achieve higher levels of security and reliability by utilizing them. To reduce the public key cryptography operations we will use light weight hashing operations along with the routes between source and destination.The proposed model improves all the drawbacks of multi hop cellular networks, which excludes and if not possible, minimizes the number of malicious node in the routes.

Authors and Affiliations

G. Vidhisha Yadav, N. Ramanjaneya Reddy, U. Sesadri

Keywords

Related Articles

Evaluating and Improving E-Government in Jordan

The development of the world web increases the online users and consequently forces many governments around the world to take advantage of the facilities offered by the internet. One of these facilities is the E-Governme...

3D from 2D for Nano images using images processing methods

The scanning electron microscope (SEM) remains a main tool for semiconductor and polymer physics but TEM and AFM are increasingly used for minimum size features which called nanomaterials. In addition some physical prope...

The Analysis of Mobile WiMAX and LTE using MIMO technique

A quality of service is a fundamental component of the 4G broadband network for satisfactory service delivery by evolving internet application to end user, and managing the network resources. The 4G technology has emerge...

Blind Identification of Transmission Channel with the method of Higher-OrderCummulants

The modern telecommunication systems require very high transmission rates, in this context, the problem of channels identification is a challenge major. The use of blind techniques is a great interest to have the best co...

Secret Image Sharing Based on Discrete Cosine Transform

The main challenges facing secure image sharing tasks are the increase of sharing volume and sharing-control flexibility. A new scheme based on DCT is developed to perform packet secret image sharing, the DCT is used to...

Download PDF file
  • EP ID EP650339
  • DOI 10.24297/ijct.v11i7.3473
  • Views 104
  • Downloads 0

How To Cite

G. Vidhisha Yadav, N. Ramanjaneya Reddy, U. Sesadri (2013). Performance Analysis of Malicious nodes on Multi hop Cellular Networks. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 11(7), 2752-2758. https://europub.co.uk/articles/-A-650339