2008 4th International Conference on Wireless Communications, Networking and Mobile Computing 2008
DOI: 10.1109/wicom.2008.1165
|View full text |Cite
|
Sign up to set email alerts
|

Tracing the Abnormal Behavior of Malicious Nodes in MANET

Abstract: This paper introduces a new technique for tracing the malicious nodes in Mobile Adhoc Network (MANET) for wireless communication .As the Mobile hosts are free to move any where and can change the wireless topology frequently, each node of MANET are much more vulnerable to insider attacks specially under noise and external attacks due to lack of permanent infrastructure, limited resources, central administrator etc. Here in this paper, we have done an investigation and mathematical analysis based upon the detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The incorporated properties of the MANET system are the sole reason for quality of services too. Although various work like [28] [29], [30], etc has addresses the routing security, but it failed to address specifically more critical issues like channel capacity (packet delivery ratio, bandwidth, jitter, delay etc). It can be easily seen from all these above mentioned work that although the optimal security is established, but it has no positive effect on QoS parameters.…”
Section: Quality Of Service (Qos)mentioning
confidence: 99%
“…The incorporated properties of the MANET system are the sole reason for quality of services too. Although various work like [28] [29], [30], etc has addresses the routing security, but it failed to address specifically more critical issues like channel capacity (packet delivery ratio, bandwidth, jitter, delay etc). It can be easily seen from all these above mentioned work that although the optimal security is established, but it has no positive effect on QoS parameters.…”
Section: Quality Of Service (Qos)mentioning
confidence: 99%
“…In this way, it becomes obligatory to characterize the typical and malicious behavior of a node. [9]. An intruder exploits the vulnerabilities displays in the ad hoc network and attacks the node which breaks the security standards.…”
Section: Introductionmentioning
confidence: 99%