Author : Madhavi Dhingra 1
Date of Publication :30th November 2017
Abstract: Wireless networks work in either ad-hoc manner or in infrastructure mode. Information security is the most important thing in any kind of wireless network. This security depends majorly on the nodes and the path, through which the information passes on. The concept of malicious nodes came when nodes started showing abnormal behavior in the network. These nodes affect the network performance adversely and thus, security of the network involves identification of such nodes and removal of them. This paper has reviewed the concept of normal and malicious node behavior and the various techniques that have been used for mitigating malicious node attacks.
Reference :