Detecting Malicious Nodes for Secure Route Discovery in MANETs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

In Today's world secure transmission of data is ubiquitous need. In MANET secure route discovery and secure routing of data plays an important role in data transmission. Because of it's dynamic topology, infrastructure less and openness, lots of intruders or malicious nodes getting a big opportunity to insert themselves as one of the legitimate nodes in the network. By taking this advantage they break down network performance of their malicious behavior. The major challenge is to secure route instead of data. Actually there is no fun to protect data rather than to protect route if route containing malicious nodes and packet is dropped by any of intermediate nodes due to one or another reason. In our paper we detect malicious nodes are restricted from router selection in the future by other nodes in network for secure data transmission.

Keywords: Security, malicious nodes, MANET, legitimate nodes, secure data transmission

Edition: Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Share this Article

How to Cite this Article?

Zalte S. S., Dr. Ghorpade V. R., "Detecting Malicious Nodes for Secure Route Discovery in MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164820, Volume 5 Issue 6, June 2016, 2269 - 2272

113 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'malicious nodes'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'legitimate nodes'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 891 - 894

Reduction of Energy Consumption and Attack Prevention in Mobile Wireless Sensor Network: A Review

Ashe Kiran, Deepinder Dhaliwal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 424 - 428

Detection and Avoidance of Clone Attack in WSN Using Neighbor Witness Node

Ghansham Dass, Rishideep Singh

Share this Article

Similar Articles with Keyword 'secure data transmission'

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1345 - 1348

A Survey on Security Frameworks for Cluster Based Wireless Sensor Networks

Shital Mane, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article
Top