Clustering Adversary Nodes and Key Reconstruction in Minimum Cost Blocking Problems

Download Now
Provided by: IJAEGT
Topic: Networking
Format: PDF
In this paper, the authors bring malicious activities on wireless mesh networks with wireless routing protocols. Upon the selection of route discovery malicious attacks are ahead to compromise the nodes such as network partitioning, node isolation activities. The cardinal covering in the routing protocols address the packets in the network. When attacks are take place by the opponent, they negotiate the attacker node and choose another way to send the packet from source to destination .But it can't be moved from the wireless network. Here proposing, looking into the clustering protocols along with ID-based key update protocols, this is very predicting in wireless networks.
Download Now

Find By Topic