Indian Journal of Science and Technology
DOI: 10.17485/ijst/2017/v10i27/111854
Year: 2017, Volume: 10, Issue: 27, Pages: 1-12
Original Article
Swati Sharma and Harpal Singh
Department of Electronics and Communication Engineering, Chandigarh Engineering College, Mohali – 140307, Punjab, India; [email protected], [email protected]
Objectives: A unique and effective algorithm for location based key generation is devised and implemented which makes use of dynamic key exchange based on the GPS Location. This approach makes the communication more secured and reliable with the avoidance of Wicked WiMax Node attacks. Methods/Statistical Analysis: The dynamic movement of malicious node is deeply analyzed with the probability of identification of sniffing and intrusion in the network makes the overall scenario secured and integrity aware. Findings: The projected approach of identifying the malicious node is effectual making the overall network environment secured with the deep of wicked node attacks. Using this approach, the overall network intrusions can be controlled and avoided from wicked node attacks. Application/Improvements: The recognition and logging the wicked node attempts is making the defense aware anti intrusion network environment against assorted network assaults.
Keywords: Malicious Node Attacks, Network Security, Secured Networks, Wicked Node Attack, Wi-Max Network Security
Subscribe now for latest articles and news.