An Effectual Approach for Security and Integrity against Wicked Node Attacks in Wi-Max Network Environment

Swati Sharma, Harpal Singh
2017 Indian Journal of Science and Technology  
Objectives: A unique and effective algorithm for location based key generation is devised and implemented which makes use of dynamic key exchange based on the GPS Location. This approach makes the communication more secured and reliable with the avoidance of Wicked WiMax Node attacks. Methods/Statistical Analysis: The dynamic movement of malicious node is deeply analyzed with the probability of identification of sniffing and intrusion in the network makes the overall scenario secured and
more » ... secured and integrity aware. Findings: The projected approach of identifying the malicious node is effectual making the overall network environment secured with the deep of wicked node attacks. Using this approach, the overall network intrusions can be controlled and avoided from wicked node attacks. Application/Improvements: The recognition and logging the wicked node attempts is making the defense aware anti intrusion network environment against assorted network assaults. ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 can be enforced in the wireless environment and by this approach the wicked node attacks can be pushed back effectively. Wi-Max The wireless networks are traditionally susceptible from assorted attacks and sniffing attempts. Therefore number of algorithms are devised and implemented at different layers of 802.16. Despite the enforced algorithmic approaches, there is need to develop and implement the higher trust based architectures so that the overall communication can be made secured.
doi:10.17485/ijst/2017/v10i27/111854 fatcat:hgzvtby675d2jjt3lgzrmveppm