Volume 7 - Issue 6
Detection of compromised nodes in mobile ad-hoc networks
Abstract
This paper aims at detection of the compromised nodes in ad-hoc networks. A solution has been proposed using threshold cryptography and Chinese Remainder Theorem. All nodes involved in the transmission process are authenticated. Then, threshold cryptography is used to share the message and Chinese Remainder Theorem for routing verification and to verify whether the node is authenticated or not. Here, we address the problems of compromised nodes such as message dropping, message alteration and routing to wrong destination.
Paper Details
PaperID: 79959592272
Author's Name: Emil Selvan, G.S.R., Suganthi, M., Jeni, P., Krishna Priya, K.A.
Volume: Volume 7
Issues: Issue 6
Keywords: Chinese remainder theorem, Compromised nodes, Node authentication, Routing, Threshold cryptography
Year: 2011
Month: June
Pages: 1823 - 1829