November 2017 Issue Vol.7 No.11

Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
Associate Professor, Dept of Computer Science,Erode Arts And Science College (Autonomous), Erode, Tamil Nadu, India
M.Phil., Research Scholar, Dept of Computer Science,Erode Arts And Science College (Autonomous), Erode,Tamil Nadu, India

Abstract: Autonomous wireless nodes without fixed infrastructure are connected to construct the Mobile Adhoc Networks (MANET). The MANETs are build and used in the military, commercial and disaster management operations. The data provider node provides its data to other wireless nodes. The shared data values are transferred with reference to the query received from other nodes. All the request and response elements are passed through the path nodes. The query request and reply are transmitted with different routing schemes. The query request and reply operations are carried out to access the data values under the data providers. The query value is broadcasted to all the nodes in the MANET. The top-k data elements are produced as reply for the queried node through different routes. The reply data can be changed in the intermediate node. The malicious data modification activity is referred as Data Replacement Attack (DRA). Query reply verification is carried out to detect the malicious node discovery process. The clustering process groups the neighbor nodes with resource and proximity information. The malicious node detection is carried out in cluster level with local and global verification schemes. The malicious node information is broadcasted as notification to all nodes. The MANET data query scheme is composed with data sharing and security features. Cluster construction and malicious node detection operations are built with data security. The malicious node discovery process is improved with liar node and False Notification Attack (FNA) discovery operations. The Message Authentication Code (MAC) is prepared with confidentiality and integrity verification schemes. The malicious node operations are controlled using the Message Authentication Code. The RSA algorithm, Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) are used for the data confidentiality and integrity verification process.

Read complete November2017