SN Pari, K Sudharson - Computer Systems Science & …, 2023 - cdn.techscience.cn
… Neelavathy Pari, “Detecting maliciousnodes in MANET using rateless codes for maximum content distribution,” in 2014 Sixth Int. Conf. on Advanced Computing (ICoAC), Chennai, India…
… proper layer of security to keep it safe from malicious attacks. So in this paper, we proposed a framework that helps in detecting the maliciousnodes at each of the destinations. After the …
… of maliciousnodes. Game theory is mainly used to study security problems identification in MANET. The Bayesian Hybrid Detection (BHD) is applied to detect the maliciousnodes. A …
… solution for efficient classification of the node which is malicious and the node which is normal in … Step 2: We introduce maliciousnodes in the network. These maliciousnodes drop the …
… node … nodes thereby achieving secure communication in MANET. The proposed scheme addresses the wide security concerns including the detection and prevention of maliciousnodes…
… node. This FPT-CFG-based detection approach completely concentrated on identifying the passive maliciousnodes as it very different to determine these nodes … the malevolentnodes …
… nodes attack other network nodes and avoid detection by using the mobility of nodes in MANETs… One of the more effective techniques is to use game theory to detect maliciousnodes. …
… related information assortment that identifies maliciousnodes in the MANET is proposed. The … to distinguish maliciousnodes at specified time intervals. To perform a maliciousnode …
M Ponnusamy - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
… this reputation scheme the maliciousnodes are non co-operative with each other.-The reputed nodes are detected through the analysis of communication ratio between the nodes. The …