Detection of Compromised Nodes in Mobile Ad-Hoc Networks

Download Now
Provided by: Binary Information Press
Topic: Security
Format: PDF
In this paper, the authors aim at detection of the compromised nodes in ad-hoc networks. A solution has been proposed using threshold cryptography and Chinese Remainder Theorem. All nodes involved in the transmission process are authenticated. Then, threshold cryptography is used to share the message and Chinese Remainder Theorem for routing verification and to verify whether the node is authenticated or not. Here, they address the problems of compromised nodes such as message dropping, message alteration and routing to wrong destination.
Download Now

Find By Topic