International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 131

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017


A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya, Dr. V. Pazhanisamy


Abstract: A wireless ad hoc network consists of various mobile nodes connected by wireless links. The union of which makes an arbitrary graph. In a wireless ad hoc network, nodes can openly move around while communicating with each other. Being a network which is able to connect multiple nodes and networks with any large distance security becomes the biggest concern because the information travels through many unknown nodes and multiple paths. Sending information through a single path is not prudent because it can be easily hacked, the single path cannot be fully trusted. To get rid of hacking the sender may send multiple copies of the information through multiple paths. This increases the risk of information leakage. Shared cryptography addresses this concern. Clustering the nodes managestraffic. This paper puts forth a reformed Security Scheme for Wireless Ad hoc Networks to detect malicious nodes by combining the clustering scheme, uncertainty of receivers authenticity were sensed.


Keywords: Ad hoc, Arbitrary Graph, Cryptography, Clustering


Edition: Volume 6 Issue 11, November 2017,


Pages: 104 - 108


How to Cite this Article?

J. Nithyapriya, Dr. V. Pazhanisamy, "A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20177791, Volume 6 Issue 11, November 2017, 104 - 108

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Ad hoc'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Clustering'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 649 - 652

Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering

Babita Chauhan, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Ad'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 145 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'hoc'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Arbitrary'

Downloads: 101

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2433 - 2435

Using Functional Point Analysis and Test Point Analysis Reducing Maintenance Cost of Software

Samadhan E. Kadam, Amol K. Kadam, Dr. S. D. Joshi

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article

Similar Articles with Keyword 'Graph'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article
Top