COMPREHENSIVE STUDY ON MALICIOUS NODE DETECTION MODELS IN MOBILE NETWORKS

  • Unique Paper ID: 179071
  • Volume: 11
  • Issue: 12
  • PageNo: 5480-5486
  • Abstract:
  • Mobile networks enable communication through radio waves among users, over large geographical regions. However, the increasing number of interconnected devices in these networks heightens the potential for malicious attacks. These networks are highly vulnerable to malicious nodes. Robust security protocols, anomaly detection mechanisms, frequent software updates, encryption, and user awareness are essential strategies to protect mobile networks. Furthermore, machine learning (ML) and deep learning (DL) techniques offer significant improvements in anomaly detection capabilities. Despite these advances, mobile networks face ongoing challenges, such as resource constraints, high false positive rates, and sophisticated malicious nodes that mimic legitimate users. This paper explores various malicious node detection mechanisms, highlighting their limitations, and proposes that deep learning-based methods offer improved efficiency in terms of resource and energy consumption. A comparative analysis is conducted using three detection mechanisms: the Anonymous Handover Authentication (AHA) process, a Secure Blockchain-Based Authentication and Key Agreement (5GSBA) scheme, and the Elliptic Curve Cryptography-Based Diffie-Hellman (ECDH) method.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{179071,
        author = {GOTTE RANJITH KUMAR and Dr.K.Suresh babu},
        title = {COMPREHENSIVE STUDY ON MALICIOUS NODE DETECTION MODELS IN MOBILE NETWORKS},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {12},
        pages = {5480-5486},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=179071},
        abstract = {Mobile networks enable communication through radio waves among users, over large geographical regions. However, the increasing number of interconnected devices in these networks heightens the potential for malicious attacks. These networks are highly vulnerable to malicious nodes. Robust security protocols, anomaly detection mechanisms, frequent software updates, encryption, and user awareness are essential strategies to protect mobile networks. Furthermore, machine learning (ML) and deep learning (DL) techniques offer significant improvements in anomaly detection capabilities. Despite these advances, mobile networks face ongoing challenges, such as resource constraints, high false positive rates, and sophisticated malicious nodes that mimic legitimate users. This paper explores various malicious node detection mechanisms, highlighting their limitations, and proposes that deep learning-based methods offer improved efficiency in terms of resource and energy consumption. A comparative analysis is conducted using three detection mechanisms: the Anonymous Handover Authentication (AHA) process, a Secure Blockchain-Based Authentication and Key Agreement (5GSBA) scheme, and the Elliptic Curve Cryptography-Based Diffie-Hellman (ECDH) method.},
        keywords = {Mobile networks, Malicious node detection, Handover Authentication process, Secure Blockchain-Based Authentication and Key Agreement scheme, and the Elliptic Curve Cryptography-Based Diffie-Hellman method.},
        month = {May},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 12
  • PageNo: 5480-5486

COMPREHENSIVE STUDY ON MALICIOUS NODE DETECTION MODELS IN MOBILE NETWORKS

Related Articles