Optimized fuzzy based malicious node detection on routing and certificate authority based secure communication in wireless Ad-HOC network

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The general behavior of Mobile AdHoc Networks (MANETs) is different in certain stages due to its mode of operations and maintenance as well as factors such as Node-Energy level, manipulation energy, randomly movable nature and the topology-changes. These type of dynamicity causes or needs over concentration and needs more security with routing-stability. For eliminating these issues and improve the security, a new methodology called Fuzzy Secured Node Selection Routing (FSNSR) is defined, which provides the Trusted-Network-Service and better performance with energy efficiency in security and dynamicity perspectives. This algorithm FSNSR provides high-reliability and dynamicity to nodes, which can move frequently without any security causes and attain more robustness during performance. The selection of next node selection and forwarding is purely based on the link-stability and next-neighbor availability, which is ensured by means of the parental node by sending route-request and getting response for the request. Once the neighbor provides the response properly for the raised request the node will be treated as a next successful neighbor, otherwise the node will be considered as a malicious node and which cannot be considered for next process further. The survey results further to guarantee regarding the network robustness, dynamicity, good packet delivery ratio, goodput and secure-routing over MANET with the help of Fuzzy Secured Node Selection Routing.

Cite

CITATION STYLE

APA

Rajkumar, K., & Jeyakumar, M. K. (2019). Optimized fuzzy based malicious node detection on routing and certificate authority based secure communication in wireless Ad-HOC network. International Journal of Innovative Technology and Exploring Engineering, 8(11 Special issue 2), 355–361. https://doi.org/10.35940/ijitee.K1057.09811S219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free