2011 | OriginalPaper | Chapter
Detection of Malicious Node in Ad Hoc Networks Using Statistical Technique Based on CPU Utilization
Authors : Deepak Sharma, Deepak Prashar, Dalwinder Singh Salaria, G. Geetha
Published in: High Performance Architecture and Grid Computing
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Proposing a strategy based on statistical value provided by each node of the network for detecting their malicious activity by comparing the node’s present characteristic value with the old estimated value .If the difference between the two values is higher than expected value then that particular node become suspicions, a knowledge based system can take decision to expel the malicious node from the network topology.