Ad-hoc网络中恶意节点检测的E-CREDND方案

Shilpi, D. Rizvi
{"title":"Ad-hoc网络中恶意节点检测的E-CREDND方案","authors":"Shilpi, D. Rizvi","doi":"10.4108/eai.13-7-2018.163971","DOIUrl":null,"url":null,"abstract":"The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of their remote association approach. Subsequently, the data from these systems can be stolen effectively just by presenting the aggressor nodes in the system. The hop count metric is calculated to determine the straight route degree. For this reason, directing conventions are arranged. Among all the potential assaults on MANET, identification of wormhole attack is considered to be most problematic. One malevolent node gets packets from a specific area, tunnels them to an alternate transmissible node arranged in another area of the system and deforms the full steering strategy. All routes are merged to the wormhole set up by the aggressors. The total directing framework in MANET gets diverted. Here in this paper, a procedure for identifying malevolent nodes in movable ad-hoc system has been proposed (E-CREDND) and this scheme is critical for the regions where the route separate in the midst of source and goal is two nodes only. This scheme isn't appropriate for those situations where multi-hops are exhibited in the midst of transmitter and recipient. In the anticipated investigation, another procedure is executed for the identification and separation of aggressor sensor nodes from the system. The anticipated plan is used in NS2 and it is portrayed by the propagation results that the anticipated plan demonstrates better execution in correlation with existing methodologies.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network\",\"authors\":\"Shilpi, D. Rizvi\",\"doi\":\"10.4108/eai.13-7-2018.163971\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of their remote association approach. Subsequently, the data from these systems can be stolen effectively just by presenting the aggressor nodes in the system. The hop count metric is calculated to determine the straight route degree. For this reason, directing conventions are arranged. Among all the potential assaults on MANET, identification of wormhole attack is considered to be most problematic. One malevolent node gets packets from a specific area, tunnels them to an alternate transmissible node arranged in another area of the system and deforms the full steering strategy. All routes are merged to the wormhole set up by the aggressors. The total directing framework in MANET gets diverted. Here in this paper, a procedure for identifying malevolent nodes in movable ad-hoc system has been proposed (E-CREDND) and this scheme is critical for the regions where the route separate in the midst of source and goal is two nodes only. This scheme isn't appropriate for those situations where multi-hops are exhibited in the midst of transmitter and recipient. In the anticipated investigation, another procedure is executed for the identification and separation of aggressor sensor nodes from the system. The anticipated plan is used in NS2 and it is portrayed by the propagation results that the anticipated plan demonstrates better execution in correlation with existing methodologies.\",\"PeriodicalId\":299985,\"journal\":{\"name\":\"EAI Endorsed Trans. Mob. Commun. Appl.\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EAI Endorsed Trans. Mob. Commun. Appl.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/eai.13-7-2018.163971\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Trans. Mob. Commun. Appl.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.13-7-2018.163971","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由多用途节点组成且本质上无基础设施的远程网络是移动自组网(MANET)。它在主观和无常的系统拓扑中强大地自我组合。根据它们的远程关联方法,这些可移动的临时系统是不诚实的,对任何中断都无能为力。随后,只要在系统中呈现攻击者节点,就可以有效地窃取来自这些系统的数据。通过计算跳数度量来确定直线路由的程度。为此,安排了导演惯例。在对无线局域网的所有潜在攻击中,虫洞攻击的识别被认为是最困难的。一个恶意节点从特定区域获取数据包,将它们传输到系统另一个区域的备用传输节点,并改变整个转向策略。所有的路由都被合并到侵略者建立的虫洞。MANET的总指挥框架被转移了。本文提出了一种可移动自组织系统中恶意节点的识别方法(E-CREDND),该方法对于源和目标中间分离的路由只有两个节点的区域至关重要。该方案不适用于发送端和接收端之间存在多跳的情况。在预期的调查中,执行另一个程序来识别和分离攻击者传感器节点。预期计划在NS2中使用,传播结果表明预期计划在与现有方法相关的情况下表现出更好的执行能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network
The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of their remote association approach. Subsequently, the data from these systems can be stolen effectively just by presenting the aggressor nodes in the system. The hop count metric is calculated to determine the straight route degree. For this reason, directing conventions are arranged. Among all the potential assaults on MANET, identification of wormhole attack is considered to be most problematic. One malevolent node gets packets from a specific area, tunnels them to an alternate transmissible node arranged in another area of the system and deforms the full steering strategy. All routes are merged to the wormhole set up by the aggressors. The total directing framework in MANET gets diverted. Here in this paper, a procedure for identifying malevolent nodes in movable ad-hoc system has been proposed (E-CREDND) and this scheme is critical for the regions where the route separate in the midst of source and goal is two nodes only. This scheme isn't appropriate for those situations where multi-hops are exhibited in the midst of transmitter and recipient. In the anticipated investigation, another procedure is executed for the identification and separation of aggressor sensor nodes from the system. The anticipated plan is used in NS2 and it is portrayed by the propagation results that the anticipated plan demonstrates better execution in correlation with existing methodologies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信