Revamped malicious node detection and removal scheme in MANET using auxiliary cluster head

ISSN: 22783075
0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

The Mobile ad hoc networks are widely accepted due to its wide range of applications in various fields of life. Amidst these advantages MANETs faces a lot of security issues due to its mobile nature and lack of efficient security mechanisms. Proposed EMDR (Esteem based Malicious node Detection and Removal) scheme provides a secure routing method for the efficient transfer of data in the network. This protocol helps to overcome the malicious node attacks effectively. It utilizes the validity value table, esteem level table and neighbor table maintained by every mobile node in the communication network to find and use a secure route between the initiating node and the final node. Depending upon the values obtained in the validity value table and esteem level table, the cluster head node identify the malicious nodes present in the path and find the most reliable route to the destination node. In addition to this security mechanism, here every mobile node has more than one cluster head. This standby cluster head is termed as auxiliary cluster head (ACH). When the main cluster head fails during data transmission, then the source node seeks the help of the auxiliary cluster head immediately. Thus it eliminates the condition of network failure.

Cite

CITATION STYLE

APA

Niveditha, P. S., Sreeleja, N., Unnithan, & Menon, P. R. (2019). Revamped malicious node detection and removal scheme in MANET using auxiliary cluster head. International Journal of Innovative Technology and Exploring Engineering, 8(7), 691–695.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free