ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 11)

Publication Date:

Authors : ; ;

Page : 104-108

Keywords : Ad hoc; Arbitrary Graph; Cryptography; Clustering;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A wireless ad hoc network consists of various mobile nodes connected by wireless links. The union of which makes an arbitrary graph. In a wireless ad hoc network, nodes can openly move around while communicating with each other. Being a network which is able to connect multiple nodes and networks with any large distance security becomes the biggest concern because the information travels through many unknown nodes and multiple paths. Sending information through a single path is not prudent because it can be easily hacked, the single path cannot be fully trusted. To get rid of hacking the sender may send multiple copies of the information through multiple paths. This increases the risk of information leakage. Shared cryptography addresses this concern. Clustering the nodes managestraffic. This paper puts forth a reformed Security Scheme for Wireless Ad hoc Networks to detect malicious nodes by combining the clustering scheme, uncertainty of receivers authenticity were sensed.

Last modified: 2021-06-30 20:02:28