{"title":"利用弹性路由表检测无线网络中的恶意节点,避免数据丢失","authors":"A. Vijayaraj, S. Indhuja","doi":"10.1109/SSPS.2017.8071646","DOIUrl":null,"url":null,"abstract":"Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detection of malicious nodes to avoid data loss in wireless networks using elastic routing table\",\"authors\":\"A. Vijayaraj, S. Indhuja\",\"doi\":\"10.1109/SSPS.2017.8071646\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.\",\"PeriodicalId\":382353,\"journal\":{\"name\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSPS.2017.8071646\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of malicious nodes to avoid data loss in wireless networks using elastic routing table
Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.