Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{179071, author = {GOTTE RANJITH KUMAR and Dr.K.Suresh babu}, title = {COMPREHENSIVE STUDY ON MALICIOUS NODE DETECTION MODELS IN MOBILE NETWORKS}, journal = {International Journal of Innovative Research in Technology}, year = {2025}, volume = {11}, number = {12}, pages = {5480-5486}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=179071}, abstract = {Mobile networks enable communication through radio waves among users, over large geographical regions. However, the increasing number of interconnected devices in these networks heightens the potential for malicious attacks. These networks are highly vulnerable to malicious nodes. Robust security protocols, anomaly detection mechanisms, frequent software updates, encryption, and user awareness are essential strategies to protect mobile networks. Furthermore, machine learning (ML) and deep learning (DL) techniques offer significant improvements in anomaly detection capabilities. Despite these advances, mobile networks face ongoing challenges, such as resource constraints, high false positive rates, and sophisticated malicious nodes that mimic legitimate users. This paper explores various malicious node detection mechanisms, highlighting their limitations, and proposes that deep learning-based methods offer improved efficiency in terms of resource and energy consumption. A comparative analysis is conducted using three detection mechanisms: the Anonymous Handover Authentication (AHA) process, a Secure Blockchain-Based Authentication and Key Agreement (5GSBA) scheme, and the Elliptic Curve Cryptography-Based Diffie-Hellman (ECDH) method.}, keywords = {Mobile networks, Malicious node detection, Handover Authentication process, Secure Blockchain-Based Authentication and Key Agreement scheme, and the Elliptic Curve Cryptography-Based Diffie-Hellman method.}, month = {May}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry