Simultaneous Identification of Malicious and Liar Nodes By Rivest Shamir Adleman (RSA) Algorithm and Secure Hashing Algorithm (SHA) |
Author(s): |
| R. Gangadevi , ANNAMALI UNIVERSITY |
Keywords: |
| Ad-Hoc Networks, Malicious Nodes, Attacker, Liar Nodes, Query Processing |
Abstract |
|
A Mobile Ad-hoc Networks (MANETs) is a wireless network that has no fixed access point (or) centralized infrastructure. MANETs can change locations and configure itself because MANETs have both fixed and mobile nodes. In the existing method, by grouping the nodes and using the similarity of the information, malicious nodes are detected and identified based on the information among the groups and eventually malicious nodes are separated. In MANETs, if a normal node becomes an attacker, the malicious node tries to disrupt the operations of the system. The main drawback in the above existing method that it doesn’t address the critical Liar Nodes (LNs) responsible for the network insecurity. In this proposed work, malicious nodes are identified by the top-k-query processing methods and the liar nodes are identified by the message authentication code separately. In this method it consumes more time in terms of minutes. So we use the technique such as Weighted trust evaluation scheme to identify both the malicious and liar nodes simultaneously. Trust value is taken as the common factors to identify both the malicious and liar nodes simultaneously. When the trusted value is lower than the threshold value, then it is identified as the malicious nodes. When the trusted value is greater than the threshold value, it is then represented as the liar nodes. After the identification and the removal of the malicious and liar nodes, the message can be sent with more security by using the RSA algorithm and Secure Hashing Algorithm. To analyse the following parameters such as Packet Delivery Ratio (PDR), Energy consumption, Throughput, Packet loss and time delay were simulated through Network simulator-2 (NS-2). In the proposed work, the output produced promising results to identify and eliminate the problematic nodes and thereby improving security. |
Other Details |
|
Paper ID: IJSRDV6I21284 Published in: Volume : 6, Issue : 2 Publication Date: 01/05/2018 Page(s): 1834-1841 |
Article Preview |
|
|
|
|
