{"title":"Detection of malicious nodes to avoid data loss in wireless networks using elastic routing table","authors":"A. Vijayaraj, S. Indhuja","doi":"10.1109/SSPS.2017.8071646","DOIUrl":null,"url":null,"abstract":"Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.