Visible to the public Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks

TitleComputation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsSonekar, S. V., Pal, M., Tote, M., Sawwashere, S., Zunke, S.
Conference Name2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)
Date PublishedMarch 2020
ISBN Number978-93-80544-38-0
Keywordsactive centralized system, ad hoc network, arbitrary basis, attacks, compositionality, computation termination, execution purpose, finite state machine, finite state machines, FSM, Handheld computers, high growth rate, highly dynamic topology, hostile free environment, malicious node, malicious node detection, MANET, Metrics, mobile ad hoc networks, moving capability, networking domain, participating nodes, pubcrawl, radio range nodes, resilience, Resiliency, rigid infrastructure, security, telecommunication network topology, telecommunication security, wired line networks, wireless links, wireless medium, wireless technology

The wireless technology has knocked the door of tremendous usage and popularity in the last few years along with a high growth rate for new applications in the networking domain. Mobile Ad hoc Networks (MANETs) is solitary most appealing, alluring and challenging field where in the participating nodes do not require any active, existing and centralized system or rigid infrastructure for execution purpose and thus nodes have the moving capability on arbitrary basis. Radio range nodes directly communicate with each other through the wireless links whereas outside range nodes uses relay principle for communication. Though it is a rigid infrastructure less environment and has high growth rate but security is a major concern and becomes vital part of providing hostile free environment for communication. The MANET imposes several prominent challenges such as limited energy reserve, resource constraints, highly dynamic topology, sharing of wireless medium, energy inefficiency, recharging of the batteries etc. These challenges bound to make MANET more susceptible, more close to attacks and weak unlike the wired line networks. Theresearch paperismainly focused on two aspects, one is computation termination of cluster head algorithm and another is use of finite state machine for attacks identification.

Citation Keysonekar_computation_2020