International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016


Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S. | Dr. Ghorpade V. R.


Abstract: In Today's world secure transmission of data is ubiquitous need. In MANET secure route discovery and secure routing of data plays an important role in data transmission. Because of it's dynamic topology, infrastructure less and openness, lots of intruders or malicious nodes getting a big opportunity to insert themselves as one of the legitimate nodes in the network. By taking this advantage they break down network performance of their malicious behavior. The major challenge is to secure route instead of data. Actually there is no fun to protect data rather than to protect route if route containing malicious nodes and packet is dropped by any of intermediate nodes due to one or another reason. In our paper we detect malicious nodes are restricted from router selection in the future by other nodes in network for secure data transmission.


Keywords: Security, malicious nodes, MANET, legitimate nodes, secure data transmission


Edition: Volume 5 Issue 6, June 2016,


Pages: 2269 - 2272


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Zalte S. S., Dr. Ghorpade V. R., "Detecting Malicious Nodes for Secure Route Discovery in MANETs", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 2269-2272, https://www.ijsr.net/get_abstract.php?paper_id=NOV164820

Similar Articles with Keyword 'Security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top