UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 12
December-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1812343


Registration ID:
191199

Page Number

284-291

Share This Article


Jetir RMS

Title

An Implementation of Residual Processing Among Nodes for Malicious Detection in Manets

Abstract

In mobile ad hoc networks (MANETs), data items can be retrieved effectively by using top-k query processing method. The environment which contains malicious nodes cannot provide an accurate result. This project assumes that the malicious node tries to attempt an attack called data replacement attack in which the necessary data sets are replaced by unnecessary data sets. The proposed work includes node grouping method in top-k query processing for detecting the malicious node. The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it may induce unrelated information. The presence of false date will not let to produce accurate result during query processing. The accuracy of the query result can be maintained by forwarding the data sets along multiple routes and based on the information attached to the reply message the query-issuing node can detect the attack. By exchanging the message, single malicious node can be identified. To identify multiple malicious nodes, it’s necessary to share the information of identified malicious node to other nodes. In this method, nodes are grouped based on the similarity of the identified malicious node. Simulation experiments are conducted by using a network simulator, NS2, to verify that this method provides high accuracy and identifies multiple malicious nodes. In flexible imprompt frameworks (MANETs), it is capable to recuperate data things using top-k inquiry. In any case, exact outcomes may not be acquired in circumstances when malevolent hubs are accessible. In this project, we expect that malignant nodes attempt to supplant key data things with trivial ones (we call these data substitution assaults), and propose methods for top-k request get ready and pernicious node recognizable proof considering node assembling in MANETs. In the wake of recognizing attacks, the question issuing hub tries to perceive the malignant hubs through message exchanges with various hubs. The proposed method detects these attacks by using score values in top k query processing, in which nodes reply with data items and their score value are used to identify the data replacement attack in network.

Key Words

Mobile ad hoc networks, query processing, routing, traffic, data replacement attack, node grouping

Cite This Article

"An Implementation of Residual Processing Among Nodes for Malicious Detection in Manets", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 12, page no.284-291, December-2018, Available :http://www.jetir.org/papers/JETIR1812343.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"An Implementation of Residual Processing Among Nodes for Malicious Detection in Manets", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 12, page no. pp284-291, December-2018, Available at : http://www.jetir.org/papers/JETIR1812343.pdf

Publication Details

Published Paper ID: JETIR1812343
Registration ID: 191199
Published In: Volume 5 | Issue 12 | Year December-2018
DOI (Digital Object Identifier):
Page No: 284-291
Country: visakhapatnam, AP, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002863

Print This Page

Current Call For Paper

Jetir RMS