The impact of malicious nodes on the performance of wireless ad-hoc networks

  • Houssein Hallani
  • , Seyed A. Shahrestani

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

1 Citation (Scopus)

Abstract

A wireless Ad-hoc network is a group of wireless devices that are capable of communicating with each other without the need for any central management infrastructure. Such a capability, along with the mobile nature of these networks, provide many advantages. However, these same characteristics are the root of several nontrivial challenges in securing such networks. A major challenge of Ad-hoc networks is their inherent security issues. Which make them susceptible to several security risks. In particular the presence of malicious nodes which can significantly affect the overall performance. Therefore the aim of this work is studying the network performance of Adhoc networks in the presence of malicious nodes. These include the measurement of the round-trip delay network throughput, and packet loss rate. Several simulations were conducted to investigate the performance of transport layer protocols, both TCP and UDP when used by the malicious nodes. Results that are carried out using OPtimised NETwork (OPNET) simulator show a noticeable difference in the performance of the Ad-hoc network depending on which transport layer protocol is used by the malicious nodes.

Original languageEnglish
Title of host publicationManaging Information in the Digital Economy
Subtitle of host publicationIssues and Solutions - Proceedings of the 6th International Business Information Management Association Conference, IBIMA 2006
PublisherInternational Business Information Management Association, IBIMA
Pages596-601
Number of pages6
ISBN (Print)9780975339350
Publication statusPublished - 2006
Event6th International Business Information Management Association Conference, IBIMA 2006 - Bonn, Germany
Duration: 19 Jun 200621 Jun 2006

Publication series

NameManaging Information in the Digital Economy: Issues and Solutions - Proceedings of the 6th International Business Information Management Association Conference, IBIMA 2006

Conference

Conference6th International Business Information Management Association Conference, IBIMA 2006
Country/TerritoryGermany
CityBonn
Period19/06/0621/06/06

Keywords

  • Ad-hoc networks
  • Malicious nodes
  • Network performance simulation
  • Packet loss
  • Performance analysis
  • Round-trip delay
  • Throughput

Fingerprint

Dive into the research topics of 'The impact of malicious nodes on the performance of wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this