Open Access
Subscription Access
An Effectual Approach for Security and Integrity against Wicked Node Attacks in Wi-Max Network Environment
Objectives: A unique and effective algorithm for location based key generation is devised and implemented which makes use of dynamic key exchange based on the GPS Location. This approach makes the communication more secured and reliable with the avoidance of Wicked WiMax Node attacks. Methods/Statistical Analysis: The dynamic movement of malicious node is deeply analyzed with the probability of identification of sniffing and intrusion in the network makes the overall scenario secured and integrity aware. Findings: The projected approach of identifying the malicious node is effectual making the overall network environment secured with the deep of wicked node attacks. Using this approach, the overall network intrusions can be controlled and avoided from wicked node attacks. Application/Improvements: The recognition and logging the wicked node attempts is making the defense aware anti intrusion network environment against assorted network assaults.
Keywords
Malicious Node Attacks, Network Security, Secured Networks, Wicked Node Attack, Wi-Max Network Security
User
Information
Abstract Views: 182
PDF Views: 0