High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Top-K Query Processing in MANETS on Malicious Node Identification

Author(s):

D. Porselvi , ADHIYAMAAN COLLEGE OF ENGINEERING; B. Gopinathan, ADHIYAMAAN COLLEGE OF ENGINEERING

Keywords:

Ad Hoc Networks, Top-K Query Processing, Data Replacement Attack, Grouping

Abstract

In flexible imprompt frameworks (MANETs), it is capable to recuperate data things using top-k inquiry. In any case, exact outcomes may not be acquired in circumstances when malevolent hubs are accessible. In this paper, we expect that malignant nodes attempt to supplant key data things with trivial ones (we call these data substitution assaults), and propose methods for top-k request get ready and pernicious node recognizable proof considering node assembling in MANETs. In the wake of recognizing attacks, the question issuing hub tries to perceive the malignant hubs through message exchanges with various hubs. It is suitable for a hub to share information about the distinguished harmful hubs with different hubs. . We lead proliferation tests by using a framework test framework, QualNet5.2, to watch that our procedure finishes high exactness of the question result and recognizes malicious hubs.

Other Details

Paper ID: IJSRDV4I120464
Published in: Volume : 4, Issue : 12
Publication Date: 01/03/2017
Page(s): 535-537

Article Preview

Download Article