2012
DOI: 10.7763/ijmlc.2012.v2.190
|View full text |Cite
|
Sign up to set email alerts
|

Trust Count Based Authentication Technique for Mitigation of Internal Attacks in MANET

Abstract: Abstract-The wireless nature and inherent features of mobile ad hoc networks make them vulnerable to a wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we develop a cluster based authentication technique to mitigate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Bo Wang et al [19], paper m define the minimum cost oppo can be defined based on the tr The purport of new approach also detect the malicious nodes to verify the MCOR algorithm R.Murugan et al [20], in this, an access policy (AP) which d Modify (M), Forward (F), subsistence of offline certificat a certificate which consist Expiration Time (CET).…”
Section: Trust Management In Manetsmentioning
confidence: 99%
“…Bo Wang et al [19], paper m define the minimum cost oppo can be defined based on the tr The purport of new approach also detect the malicious nodes to verify the MCOR algorithm R.Murugan et al [20], in this, an access policy (AP) which d Modify (M), Forward (F), subsistence of offline certificat a certificate which consist Expiration Time (CET).…”
Section: Trust Management In Manetsmentioning
confidence: 99%