About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I

Research Article

Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata

Download(Requires a free EAI acccount)
343 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-27299-8_22,
        author={Himadri Saha and Debika Bhattachayya and P. Banerjee},
        title={Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata},
        proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I},
        proceedings_a={CCSIT PART I},
        year={2012},
        month={11},
        keywords={Ad hoc network User authentication Node capturing Shared key mechanism Cellular automata},
        doi={10.1007/978-3-642-27299-8_22}
    }
    
  • Himadri Saha
    Debika Bhattachayya
    P. Banerjee
    Year: 2012
    Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
    CCSIT PART I
    Springer
    DOI: 10.1007/978-3-642-27299-8_22
Himadri Saha1, Debika Bhattachayya1, P. Banerjee2
  • 1: Institute of Engineering & Management
  • 2: Jadavpur University

Abstract

Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA). Our simulation results show how cellular automata(CA) is implemented for user authentication and secure transmission in MANET.

Keywords
Ad hoc network User authentication Node capturing Shared key mechanism Cellular automata
Published
2012-11-09
http://dx.doi.org/10.1007/978-3-642-27299-8_22
Copyright © 2012–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL