An Efficient Top-K Query Processing in MANETS on Malicious Node Identification
Author(s):
M.Shalima Sulthana, K..R. Harinath, A.Mahendra
Keywords:
Mobile ad hoc networks, query processing, routing, traffic, data replacement attack, node grouping
Abstract
In mobile ad hoc networks (MANETs), data items can be retrieved effectively by using topk query processing method. The environment which contains malicious nodes cannot provide an accurate result. This paper assumes that the malicious node tries to attempt an attack called data replacement attack in which the necessary data sets are replaced by unnecessary data sets. The proposed work includes node grouping method in top-k query processing for detecting the malicious node. The accuracy of the query result can be maintained by forwarding the data sets along multiple routes and based on the information attached to the reply message the query-issuing node can detect the attack. By exchanging the message, single malicious node can be identified. To identify multiple malicious nodes, it’s necessary to share the information of identified malicious node to other nodes. In this method, nodes are grouped based on the similarity of the identified malicious node. Simulation experiments are conducted by using a network simulator, NS2, to verify that this method provides high accuracy and identifies multiple malicious nodes.
Article Details
Unique Paper ID: 146128

Publication Volume & Issue: Volume 4, Issue 11

Page(s): 1243 - 1248
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews