Detection of compromised nodes in mobile ad-hoc networks
This paper aims at detection of the compromised nodes in ad-hoc networks. A solution has been proposed using threshold cryptography and Chinese Remainder Theorem. All nodes involved in the transmission process are authenticated. Then, threshold cryptography is used to share the message and Chinese Remainder Theorem for routing verification and to verify whether the node is authenticated or not. Here, we address the problems of compromised nodes such as message dropping, message alteration and routing to wrong destination.
Author's Name: Emil Selvan, G.S.R., Suganthi, M., Jeni, P., Krishna Priya, K.A.