Research Article
Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
278 downloads
@INPROCEEDINGS{10.1007/978-3-642-27299-8_22, author={Himadri Saha and Debika Bhattachayya and P. Banerjee}, title={Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata}, proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I}, proceedings_a={CCSIT PART I}, year={2012}, month={11}, keywords={Ad hoc network User authentication Node capturing Shared key mechanism Cellular automata}, doi={10.1007/978-3-642-27299-8_22} }
- Himadri Saha
Debika Bhattachayya
P. Banerjee
Year: 2012
Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
CCSIT PART I
Springer
DOI: 10.1007/978-3-642-27299-8_22
Abstract
Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA). Our simulation results show how cellular automata(CA) is implemented for user authentication and secure transmission in MANET.
Copyright © 2012–2024 ICST