An Efficient Top-K Query Processing in MANETS on Malicious Node Identification
Author(s):
M.Shalima Sulthana, K..R. Harinath, A.Mahendra
Keywords:
Mobile ad hoc networks, query processing, routing, traffic, data replacement attack, node grouping
Abstract
In mobile ad hoc networks (MANETs), data items can be retrieved effectively by using topk query processing method. The environment which contains malicious nodes cannot provide an accurate result. This paper assumes that the malicious node tries to attempt an attack called data replacement attack in which the necessary data sets are replaced by unnecessary data sets. The proposed work includes node grouping method in top-k query processing for detecting the malicious node. The accuracy of the query result can be maintained by forwarding the data sets along multiple routes and based on the information attached to the reply message the query-issuing node can detect the attack. By exchanging the message, single malicious node can be identified. To identify multiple malicious nodes, it’s necessary to share the information of identified malicious node to other nodes. In this method, nodes are grouped based on the similarity of the identified malicious node. Simulation experiments are conducted by using a network simulator, NS2, to verify that this method provides high accuracy and identifies multiple malicious nodes.
Article Details
Unique Paper ID: 146128
Publication Volume & Issue: Volume 4, Issue 11
Page(s): 1243 - 1248
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024