Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Title | Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Sonekar, S. V., Pal, M., Tote, M., Sawwashere, S., Zunke, S. |
Conference Name | 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom) |
Date Published | March 2020 |
Publisher | IEEE |
ISBN Number | 978-93-80544-38-0 |
Keywords | active centralized system, ad hoc network, arbitrary basis, attacks, compositionality, computation termination, execution purpose, finite state machine, finite state machines, FSM, Handheld computers, high growth rate, highly dynamic topology, hostile free environment, malicious node, malicious node detection, MANET, MANET Attack Detection, Metrics, mobile ad hoc networks, moving capability, networking domain, participating nodes, pubcrawl, radio range nodes, resilience, Resiliency, rigid infrastructure, security, telecommunication network topology, telecommunication security, wired line networks, wireless links, wireless medium, wireless technology |
Abstract | The wireless technology has knocked the door of tremendous usage and popularity in the last few years along with a high growth rate for new applications in the networking domain. Mobile Ad hoc Networks (MANETs) is solitary most appealing, alluring and challenging field where in the participating nodes do not require any active, existing and centralized system or rigid infrastructure for execution purpose and thus nodes have the moving capability on arbitrary basis. Radio range nodes directly communicate with each other through the wireless links whereas outside range nodes uses relay principle for communication. Though it is a rigid infrastructure less environment and has high growth rate but security is a major concern and becomes vital part of providing hostile free environment for communication. The MANET imposes several prominent challenges such as limited energy reserve, resource constraints, highly dynamic topology, sharing of wireless medium, energy inefficiency, recharging of the batteries etc. These challenges bound to make MANET more susceptible, more close to attacks and weak unlike the wired line networks. Theresearch paperismainly focused on two aspects, one is computation termination of cluster head algorithm and another is use of finite state machine for attacks identification. |
URL | https://ieeexplore.ieee.org/document/9083710 |
DOI | 10.23919/INDIACom49435.2020.9083710 |
Citation Key | sonekar_computation_2020 |
- Resiliency
- Metrics
- mobile ad hoc networks
- moving capability
- networking domain
- participating nodes
- pubcrawl
- radio range nodes
- resilience
- MANET
- rigid infrastructure
- security
- telecommunication network topology
- telecommunication security
- wired line networks
- wireless links
- wireless medium
- wireless technology
- finite state machines
- active centralized system
- ad hoc network
- arbitrary basis
- attacks
- Compositionality
- computation termination
- execution purpose
- finite state machine
- MANET Attack Detection
- FSM
- Handheld computers
- high growth rate
- highly dynamic topology
- hostile free environment
- malicious node
- malicious node detection