Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks

Download
426 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_65,
        author={Adarsh Kumar and Krishna Gopal and Alok Aggarwal},
        title={Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={lightweight outlier anomalies security key management MANET},
        doi={10.1007/978-3-642-37949-9_65}
    }
    
  • Adarsh Kumar
    Krishna Gopal
    Alok Aggarwal
    Year: 2013
    Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_65
Adarsh Kumar,*, Krishna Gopal1,*, Alok Aggarwal,*
  • 1: Jaypee Institute of Information Technology
*Contact email: adarsh.kumar@jiit.ac.in, krishna.gopal@jiit.ac.in, alok289@yahoo.com

Abstract

This work is to detect and prevent unprecedented data identified from lightweight resource constraint mobile sensor devices. In this work, event or error detection technique of Traag et. al., local-global outlier algorithm of Branch et. al., Teo and Tan’s protocol of group key management and Cerpa et. al protocol of Frisbee construction are integrated and modified for lightweight resource constraint devices [20][22]-[24]. The proposed technique in this work is better than other techniques because of: (a) scalability, (b) optimization of resources, (c) energy efficient and (d) secure in terms of collision resistant, compression, backward and forward secrecy. The deviations in modified form of proposed mechanism are corrected using virtual programmable nodes and results show that proposed scheme work with zero probability of error and attack.