Top-K Query Processing in MANETS on Malicious Node Identification |
Author(s): |
D. Porselvi , ADHIYAMAAN COLLEGE OF ENGINEERING; B. Gopinathan, ADHIYAMAAN COLLEGE OF ENGINEERING |
Keywords: |
Ad Hoc Networks, Top-K Query Processing, Data Replacement Attack, Grouping |
Abstract |
In flexible imprompt frameworks (MANETs), it is capable to recuperate data things using top-k inquiry. In any case, exact outcomes may not be acquired in circumstances when malevolent hubs are accessible. In this paper, we expect that malignant nodes attempt to supplant key data things with trivial ones (we call these data substitution assaults), and propose methods for top-k request get ready and pernicious node recognizable proof considering node assembling in MANETs. In the wake of recognizing attacks, the question issuing hub tries to perceive the malignant hubs through message exchanges with various hubs. It is suitable for a hub to share information about the distinguished harmful hubs with different hubs. . We lead proliferation tests by using a framework test framework, QualNet5.2, to watch that our procedure finishes high exactness of the question result and recognizes malicious hubs. |
Other Details |
Paper ID: IJSRDV4I120464 Published in: Volume : 4, Issue : 12 Publication Date: 01/03/2017 Page(s): 535-537 |
Article Preview |
|
|