A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 130 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017

A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya, Dr. V. Pazhanisamy

A wireless ad hoc network consists of various mobile nodes connected by wireless links. The union of which makes an arbitrary graph. In a wireless ad hoc network, nodes can openly move around while communicating with each other. Being a network which is able to connect multiple nodes and networks with any large distance security becomes the biggest concern because the information travels through many unknown nodes and multiple paths. Sending information through a single path is not prudent because it can be easily hacked, the single path cannot be fully trusted. To get rid of hacking the sender may send multiple copies of the information through multiple paths. This increases the risk of information leakage. Shared cryptography addresses this concern. Clustering the nodes managestraffic. This paper puts forth a reformed Security Scheme for Wireless Ad hoc Networks to detect malicious nodes by combining the clustering scheme, uncertainty of receivers authenticity were sensed.

Keywords: Ad hoc, Arbitrary Graph, Cryptography, Clustering

Edition: Volume 6 Issue 11, November 2017

Pages: 104 - 108

Share this Article

How to Cite this Article?

J. Nithyapriya, Dr. V. Pazhanisamy, "A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20177791, Volume 6 Issue 11, November 2017, 104 - 108

Enter Your Registered Email Address





Similar Articles with Keyword 'Ad hoc'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Clustering'

Downloads: 74 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Downloads: 98 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

Downloads: 99 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2461 - 2466

A Review of Text Mining Techniques Associated with Various Application Areas

Dr. Shilpa Dang, Peerzada Hamid Ahmad

Share this Article

Downloads: 100 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1742 - 1745

Enhancement of Leach Protocol in Wireless Sensor Network

Bipin Patel, Hardik Kadiya

Share this Article

Downloads: 100 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Egypt, Volume 3 Issue 11, November 2014

Pages: 1128 - 1132

Keyword Extraction using Clustering and Semantic Analysis

Dr. Mohamed H. Haggag, Dr.Amal Abutabl, Ahmed Basil

Share this Article



Top