Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

  • Saini R
  • Khari M
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

Cite

CITATION STYLE

APA

Saini, R., & Khari, M. (2011). Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network. International Journal of Computer Applications, 20(4), 18–21. https://doi.org/10.5120/2422-3251

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free