International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131 | Views: 288

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017 | Popularity: 6.1 / 10


     

A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya, Dr. V. Pazhanisamy


Abstract: A wireless ad hoc network consists of various mobile nodes connected by wireless links. The union of which makes an arbitrary graph. In a wireless ad hoc network, nodes can openly move around while communicating with each other. Being a network which is able to connect multiple nodes and networks with any large distance security becomes the biggest concern because the information travels through many unknown nodes and multiple paths. Sending information through a single path is not prudent because it can be easily hacked, the single path cannot be fully trusted. To get rid of hacking the sender may send multiple copies of the information through multiple paths. This increases the risk of information leakage. Shared cryptography addresses this concern. Clustering the nodes managestraffic. This paper puts forth a reformed Security Scheme for Wireless Ad hoc Networks to detect malicious nodes by combining the clustering scheme, uncertainty of receivers authenticity were sensed.


Keywords: Ad hoc, Arbitrary Graph, Cryptography, Clustering


Edition: Volume 6 Issue 11, November 2017


Pages: 104 - 108



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
J. Nithyapriya, Dr. V. Pazhanisamy, "A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks", International Journal of Science and Research (IJSR), Volume 6 Issue 11, November 2017, pp. 104-108, https://www.ijsr.net/getabstract.php?paperid=ART20177791, DOI: https://www.doi.org/10.21275/ART20177791



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1875 - 1880

Microclustering with Outlier Detection for DADC

Aswathy Priya M.

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 1840 - 1846

Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering

Dr. Dola Sanjay S

Share this Article



Top