Utilising behaviour history to fight malicious nodes in wireless ad-hoc networks

Houssein Hallani, Seyed A. Shahrestani

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooperation amongst themselves; they overcome the need for a central infrastructure. In our previous works, the effects of the presence of malicious nodes on the performance of Ad-hoc networks have been reported. Based on the results of those works, here an approach that utilizes the behaviour history of the network nodes is proposed. In this approach, the main aim is to identify a route from source to destination that is free of malicious nodes. Several simulation studies were conducted to investigate the effect of the proposed behaviour approach on the performance of wireless Ad-hoc networks. Results that are carried out using OPtimised NETwork (OPNET) simulator show that the overall performance of the Ad-hoc networks, even in the presence of malicious nodes, can be significantly improved by incorporating the proposed approach.]]
    Original languageEnglish
    Title of host publication8th IBIMA International Conference on Information Management in the Networked Economy
    PublisherInternational Business Information Management Association
    Number of pages7
    ISBN (Print)0975339370
    Publication statusPublished - 2007
    EventInternational Business Information Management Association. Conference -
    Duration: 12 Nov 2012 → …

    Conference

    ConferenceInternational Business Information Management Association. Conference
    Period12/11/12 → …

    Keywords

    • computer networks
    • data protection
    • computer security
    • ad-hoc networks (computer networks)
    • packet switching (data transmission)
    • wireless communication systems

    Fingerprint

    Dive into the research topics of 'Utilising behaviour history to fight malicious nodes in wireless ad-hoc networks'. Together they form a unique fingerprint.

    Cite this