International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103 | Views: 257

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.3 / 10


     

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.


Abstract: In Today's world secure transmission of data is ubiquitous need. In MANET secure route discovery and secure routing of data plays an important role in data transmission. Because of it's dynamic topology, infrastructure less and openness, lots of intruders or malicious nodes getting a big opportunity to insert themselves as one of the legitimate nodes in the network. By taking this advantage they break down network performance of their malicious behavior. The major challenge is to secure route instead of data. Actually there is no fun to protect data rather than to protect route if route containing malicious nodes and packet is dropped by any of intermediate nodes due to one or another reason. In our paper we detect malicious nodes are restricted from router selection in the future by other nodes in network for secure data transmission.


Keywords: Security, malicious nodes, MANET, legitimate nodes, secure data transmission


Edition: Volume 5 Issue 6, June 2016


Pages: 2269 - 2272


DOI: https://www.doi.org/10.21275/NOV164820



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Zalte S. S., Dr. Ghorpade V. R., "Detecting Malicious Nodes for Secure Route Discovery in MANETs", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 2269-2272, https://www.ijsr.net/getabstract.php?paperid=NOV164820, DOI: https://www.doi.org/10.21275/NOV164820



Similar Articles

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article
Top