International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017


A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya | Dr. V. Pazhanisamy


Abstract: A wireless ad hoc network consists of various mobile nodes connected by wireless links. The union of which makes an arbitrary graph. In a wireless ad hoc network, nodes can openly move around while communicating with each other. Being a network which is able to connect multiple nodes and networks with any large distance security becomes the biggest concern because the information travels through many unknown nodes and multiple paths. Sending information through a single path is not prudent because it can be easily hacked, the single path cannot be fully trusted. To get rid of hacking the sender may send multiple copies of the information through multiple paths. This increases the risk of information leakage. Shared cryptography addresses this concern. Clustering the nodes managestraffic. This paper puts forth a reformed Security Scheme for Wireless Ad hoc Networks to detect malicious nodes by combining the clustering scheme, uncertainty of receivers authenticity were sensed.


Keywords: Ad hoc, Arbitrary Graph, Cryptography, Clustering


Edition: Volume 6 Issue 11, November 2017,


Pages: 104 - 108


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

J. Nithyapriya, Dr. V. Pazhanisamy, "A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks", International Journal of Science and Research (IJSR), Volume 6 Issue 11, November 2017, pp. 104-108, https://www.ijsr.net/get_abstract.php?paper_id=ART20177791

Similar Articles with Keyword 'Ad hoc'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top