Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Key Reconstruction And Clustering Opponent Nodes In Minimum Cost

Author : D.Sireesha 1 Prof C.Rajendra 2

Date of Publication :7th March 2015

Abstract: This paper detects malicious activities on wireless mesh networks with wireless routing protocols. Upon the selection of route discovery malicious attacks are ahead to compromise the nodes such as network partitioning, node isolation activities .The cardinal covering in the routing protocols address the packets in the network. When attacks are take place by the opponent, negotiate the attacker node and choose another way to send the packet from source to destination .But it can’t be moved from the wireless network. Here proposing, looking into the Clustering protocols along with id-based key update protocols, which is very predicting in wireless networks. Cryptography techniques improvise the packet in an assured way from source to destination and it doesn’t render to secure the network/system. Keywords — Model Prediction control, Artificial Neural Network, Levenberg Marquardt, back propagation.

Reference :

    1. S. Mueller, R. Tsang, and D. Ghosal, “Multipath routing in mo-bile ad hoc networks: Issues and challenges,” in In Performance Tools and Applications to Networked Systems, volume 2965 of LNCS. Springer-Verlag, 2004, pp. 209– 234.
    2. Pavankumar T, Ramesh Babu B, Rajasekharrao K, Dinesh Gopalni “cluster based routing protocol for cognitive radio wireless mesh networks”.
    3. Ann lee and Paul A.S Ward “A study of routing algorithms in wireless mesh networks”.
    4. Nikos Dimokas, DimitriosKatsaris, YannisManolopoulos.”Node clustering in wireless sensor networks by considering structural characteristics of the network graph”.
    5. Jaydip Sen. Innovation labs “Security and privacy issues in wireless mesh networks”.
    6. A length-flexible threshold cryptosystem with applications,” in Proceedings of the 8th Australasian conference on Information security and privacy, ser. ACISP’03. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 350–364.
    7. L. Ertaul and N. Chavan, “Security of ad hoc networks and threshold cryptography,” in Wireless Networks, Communications and Mobile Computing, 2005 International Conference on, vol. 1, June 2005, pp. 69 – 74
    8. M. A. Moustafa, M. A. Youssef, and M. N. El-Derini, “MSR: A multipath secure reliable routing protocol for WSNs,” in Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS Interna-tional Conference on, December 2011, pp. 54 –59.
    9. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy-efficient multipath routing in wireless sensor networks,” SIGMOBILE Mob. Computer Communication Rev., vol. 5, pp. 11–25, October 2001.
    10. J. R. Douceur, “The Sybil attack,” in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Springer, 2002, pp. 251–260.

Recent Article