Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Networks
Yomna Mohamed Mohsen;
Abstract
This chapter proposes A Clustered Generic Scheme (C-GPSIH) for distributing period-
ically updated security keys, among mobile nodes of MANETs to secure identity and
protect privacy. It is based on DBSCAN clustering technique, each cluster head is re-
sponsible for distribution of security keys among its current members. To ensure the
con dentiality of new members, an authentication scheme using symmetric cryptography
and hashing technique is proposed. New member inside cluster can gain new key and
participate in communication after passing the authentication phase. Simulation stud-
ies present the impact of varying di erent network parameters like transmission ranges,
speed, key update period and network density, on the availability and extra overhead.
Moreover, a packet delivery ratio in the presence of malicious nodes for the proposed
scheme is compared against the centralized scheme presented in chapter 4.
ically updated security keys, among mobile nodes of MANETs to secure identity and
protect privacy. It is based on DBSCAN clustering technique, each cluster head is re-
sponsible for distribution of security keys among its current members. To ensure the
con dentiality of new members, an authentication scheme using symmetric cryptography
and hashing technique is proposed. New member inside cluster can gain new key and
participate in communication after passing the authentication phase. Simulation stud-
ies present the impact of varying di erent network parameters like transmission ranges,
speed, key update period and network density, on the availability and extra overhead.
Moreover, a packet delivery ratio in the presence of malicious nodes for the proposed
scheme is compared against the centralized scheme presented in chapter 4.
Other data
| Title | Detection and Prevention of Malicious Nodes in Mobile Ad Hoc Networks | Authors | Yomna Mohamed Mohsen | Issue Date | 2017 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.