CFP last date
20 May 2024
Reseach Article

A HMM improved Neighbor Node Analysis Approach in Mobile Network

by Deepika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 9
Year of Publication: 2014
Authors: Deepika
10.5120/17555-8160

Deepika . A HMM improved Neighbor Node Analysis Approach in Mobile Network. International Journal of Computer Applications. 100, 9 ( August 2014), 25-28. DOI=10.5120/17555-8160

@article{ 10.5120/17555-8160,
author = { Deepika },
title = { A HMM improved Neighbor Node Analysis Approach in Mobile Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 9 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number9/17555-8160/ },
doi = { 10.5120/17555-8160 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:33.247850+05:30
%A Deepika
%T A HMM improved Neighbor Node Analysis Approach in Mobile Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 9
%P 25-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is one of the challenging issue for Mobile network because of its public access nature. Blackhole is the common threat in this network that capture the communication between nodes and disturb the communication network. In this work, a blackhole preventive routing scheme is presented. The work as defined a two layered analysis to identify the blackhole node and to generate the effective path. In first layer, the long term statistical information is analyzed to identify the trustfulness of node. Once the information is collected, the HMM approach is applied to identify the effective neighbor. The work in implemented in NS2 environment. The results shows that the work has improved the network throughput and decreased the communication loss and delay.

References
  1. Axel Krings," Neighborhood Monitoring in Ad Hoc Networks", CSIIRW '10, April 21-23, 2010, Oak Ridge, Tennessee, USA ACM 978-1-4503-0017-9
  2. Ying Li," Component-Based Track Inspection Using Machine-Vision Technology", ICMR'11, April 17-20, 2011, Trento, Italy ACM 978-1-4503-0336-1/11/04
  3. Bogdan Carbunar," JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks", WiSe'04, October 1, 2004, Philadelphia, Pennsylvania, USA. ACM 1-58113-925-X/04/0010
  4. Johann Schlamp," How to Prevent AS Hijacking Attacks", CoNEXT Student'12, December 10, 2012, Nice, France. ACM 978-1-4503-1779-5/12/12
  5. Joshua Goodman," Stopping Outgoing Spam", EC'04, May 17–20, 2004, New York, New York, USA. ACM 1-58113-711-0/04/0005
  6. Danny Dhillon," Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs", IWCMC'06, July 3–6, 2006, Vancouver, British Columbia, Canada. ACM 1-59593-306-9/06/0007
  7. Ahmed Khurshid," VeriFlow: Verifying Network-Wide Invariants in Real Time", HotSDN'12, August 13, 2012, Helsinki, Finland. ACM 978-1-4503-1477-0/12/08
  8. Evan Cooke," Toward Understanding Distributed Blackhole Placement", WORM'04, October 29, 2004, Washington, DC, USA. ACM 1-58113-970-5/04/0010
  9. Umair Sadiq," CRISP: Collusion–Resistant Incentive–Compatible Routing and Forwarding in Opportunistic Networks", MSWiM'12, October 21–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1628-6/12/10
  10. Mauro Conti," A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks", MobiHoc'07, September 9-14, 2007, Montréal, Québec, Canada. ACM 978-1-59593-684-4/07/0009
  11. Garima Gupta," Reference based approach to Mitigate Blackhole Attacks in Delay Tolerant Networks", Q2SWinet'12, October 24–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1619-4/12/10
  12. Abhijit Das," Energy Aware Topology Security Scheme for Mobile Ad Hoc Network", ICCCS'11, February 12–14, 2011, Rourkela, Odisha, India. ACM 978-1-4503-0464-1/11/02
  13. Peter J. J. McNerney," A 2-Dimensional Approach to QoS Provisioning in Adversarial Mobile Ad Hoc Network Environments", MSWiM'12, October 21–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1628-6/12/10
Index Terms

Computer Science
Information Sciences

Keywords

HMM Blackhole Layered Statistical