Abstract
A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Papadopoulos, K., Zahariadis, T., Leligou, N., Voliotis, S.: Sensor networks security issues in augmented home environment, pp. 1–4 (2008)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Zhou, L., Haas, Z.: Secure ad hoc networks. IEEE Network Magazine 13, 14–30 (1999)
Jacobs, S., Corion, M.S.: Wnet authentication architecture. Internet draft (1999)
Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Radio and Wireless Conference: RAWCON 2003, pp. 75–78 (2003)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: International Conference on Mobile Computing and Networking, pp. 275–283 (2000)
Chang, B.: Markov chain trust model for trust-value analysis and key management in distributed multicast manets. IEEE Transactions On Vehicular Technology 58 (2009)
Yang, H., Shu, J., Meng, X., Lu, S.: Scan: Self-organized network layer security in mobile ad hoc networks. IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks 24, 262–273 (2006)
Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks 13, 78–87 (1999)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: International Conference on Network Protocols, pp. 251–260 (2001)
Papadimitratos, P., Hass, Z.: Secure data communication in mobile ad hoc networks. IEEE Network Magazine 24, 343–356 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chandrakant, N., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M. (2010). Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-17604-3_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17603-6
Online ISBN: 978-3-642-17604-3
eBook Packages: Computer ScienceComputer Science (R0)