Abstract
![CDATA[Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooperation amongst themselves; they overcome the need for a central infrastructure. In our previous works, the effects of the presence of malicious nodes on the performance of Ad-hoc networks have been reported. Based on the results of those works, here an approach that utilizes the behaviour history of the network nodes is proposed. In this approach, the main aim is to identify a route from source to destination that is free of malicious nodes. Several simulation studies were conducted to investigate the effect of the proposed behaviour approach on the performance of wireless Ad-hoc networks. Results that are carried out using OPtimised NETwork (OPNET) simulator show that the overall performance of the Ad-hoc networks, even in the presence of malicious nodes, can be significantly improved by incorporating the proposed approach.]]
Original language | English |
---|---|
Title of host publication | 8th IBIMA International Conference on Information Management in the Networked Economy |
Publisher | International Business Information Management Association |
Number of pages | 7 |
ISBN (Print) | 0975339370 |
Publication status | Published - 2007 |
Event | International Business Information Management Association. Conference - Duration: 12 Nov 2012 → … |
Conference
Conference | International Business Information Management Association. Conference |
---|---|
Period | 12/11/12 → … |
Keywords
- computer networks
- data protection
- computer security
- ad-hoc networks (computer networks)
- packet switching (data transmission)
- wireless communication systems