The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


A mobile ad hoc network is a set of nodes without the required intervention of any fixed infrastructure. Therefore, these networks have particular application in risk and crisis management should a natural disaster such as flood and earthquake befall and destroy communications infrastructures. In the absence of a fixed infrastructure, nodes in a network need to cooperate with each other. In circumstances as such, a malicious node can easily locate itself on the route and reduce network performance by deleting packets. In this paper, we have proposed a method which enables to detect the malicious nodes using valid and invalid addresses, without triggering false detection across the network. According to the simulation results, this method is capable of detecting malicious nodes faster compared to similar methods.

Keywords

Mobile Ad Hoc Networks (manets), Risk And Crisis Management, Intrusion Detection, Black Hole Attack
User