Malicious Node Detection Using Convolution Technique

Priyanka Ahlawat,Pranjil Singhal,Khushi Goyal,Kanak Yadav,Rohit Bathla
DOI: https://doi.org/10.4018/978-1-7998-7789-9.ch006
2022-01-01
Abstract:Considering the situation when the node which is entering in the network is a malicious node, it can check and record the various operations of the network which could be responsible for some serious security issues. In order to safeguard the network, the author propose an approach which is in view of the advanced encoding strategy, termed as convolution coding approach. According to the requirement of network, the initial bits are assigned, and by applying the convolution technique, the final code is generated for each and every node. Considering the fact that it is a digital method, the codes can be represented by using the binary number system. All the nodes that are a part of the network will be having their corresponding final binary code, say C. The verification of each node is carried out by matching the generated code C with the security code within a particular time period before transmitting the data. This process enables the detection of malicious or attacker node. Furthermore, to enhance the versatility and execution, the system is organized into clusters.
What problem does this paper attempt to address?