Proceedings of the 2011 International Conference on Communication, Computing &Amp; Security - ICCCS '11 2011
DOI: 10.1145/1947940.1947965
|View full text |Cite
|
Sign up to set email alerts
|

Energy aware topology security scheme for mobile ad hoc network

Abstract: A MANET or Mobile ad hoc network is infrastructure less and is also mobile because of the nature of the applications it is proposed for. Since ad hoc networks are dynamic by nature, they require a dynamic security solution that fits its fundamental characteristics. We have proposed a scheme that will detect and isolate the topology threats in MANET. The scheme is competent enough to reduce the false detection rate. To minimise false detection we have applied a game, which also reduces the message overhead.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 8 publications
(4 reference statements)
0
11
0
Order By: Relevance
“…Author presented an isolated mechanism to handle the attacks and to reduce the false detection rate. Author presented a overhead analysis approach to improve the network reliability and to minimize the attack impact in mobile network [12]. A two dimensional analysis approach to improve the network QoS under different adversarial environments was presented by Peter J.J. McNeney.…”
Section: Existing Workmentioning
confidence: 99%
“…Author presented an isolated mechanism to handle the attacks and to reduce the false detection rate. Author presented a overhead analysis approach to improve the network reliability and to minimize the attack impact in mobile network [12]. A two dimensional analysis approach to improve the network QoS under different adversarial environments was presented by Peter J.J. McNeney.…”
Section: Existing Workmentioning
confidence: 99%
“…To deal with various sophisticated attacks we need to detect as well as prevent the attackers (malicious node). There are some basic reactive approaches available to detect the Black-Hole and Gray-Hole attacks using some statistics [6,8], but normally it doesn"t verify the wide range of characteristics of the malicious nodes and the decisions are mainly monotonic. It also may propagate useless packets while detecting.…”
Section: Introductionmentioning
confidence: 99%
“…It also may propagate useless packets while detecting. The proposed approaches [8] can detect the malicious nodes with different strategy and wide range of characteristics, with a dynamic threshold range of misbehavior. The Leader node is responsible for sending all the control packets to generate suspicion level.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[2,9,10] I. Black hole: In this scheme, information is divided into many shares for passing through multiple routes.…”
Section: Introductionmentioning
confidence: 99%