Downloads: 105 | Views: 252
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.1 / 10
Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Abstract: Mobile Ad-hoc Network (MANET) is self configured network and collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in decentralized manner. Security is major concern in MANET due to its various features such as open medium, limited power supply and lack of clear lines of defense. It is vulnerable to various types of DoS attacks like black hole, grey hole, worm hole, impersonation etc. In black hole attack, attacker claims to have shortest route to destination by injecting a fake reply message. This document introduces a comparative study of various malicious or DoS nodes detection schemes and analyse their performance based on various parameters viz node mobility, Quality of service, false alarm detection etc.
Keywords: Mobile Ad-hoc Networks MANET, Ad-hoc On Demand Distance Vector AODV, Dynamic Source Routing DSR, Denial of Service DoS, Black hole attack, malicious node
Edition: Volume 3 Issue 7, July 2014
Pages: 1572 - 1577
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 110
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1154 - 1158Route Optimization using Membrane Computing in Opportunistic Network
Ritu, Manjot Kaur Sidhu
Downloads: 114
Informative Article, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 1013 - 1017Reveal IP Spoofers Location from Route Backscatter and Passive IP Traceback
Akshay Dilip Homkar, S. D. Satav
Downloads: 116
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1615 - 1622Experimental Analysis of Data Security Challenges on Cloud
Dhruv Sirohi, Tanishka Shorey, Shivam Anand, Manjula R
Downloads: 139
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 829 - 832An Efficient Way to Prevent Dos/DDos Attack in the Cloud Environment
Vaishali Hase, Harish Barapatre