Affiliation:
1. National Institute of Technology, Kurukshetra, India
Abstract
Considering the situation when the node which is entering in the network is a malicious node, it can check and record the various operations of the network which could be responsible for some serious security issues. In order to safeguard the network, the author propose an approach which is in view of the advanced encoding strategy, termed as convolution coding approach. According to the requirement of network, the initial bits are assigned, and by applying the convolution technique, the final code is generated for each and every node. Considering the fact that it is a digital method, the codes can be represented by using the binary number system. All the nodes that are a part of the network will be having their corresponding final binary code, say C. The verification of each node is carried out by matching the generated code C with the security code within a particular time period before transmitting the data. This process enables the detection of malicious or attacker node. Furthermore, to enhance the versatility and execution, the system is organized into clusters.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Optimization Techniques in Cooperative and Distributed MAC Protocols;International Journal of Intelligent Information Technologies;2024-01-07