Utilising behaviour history to fight malicious nodes in wireless ad-hoc networks

Houssein Hallani, Seyed A. Shahrestani

Research output: Chapter in Book / Conference PaperConference Paper

Abstract

Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooperation amongst themselves; they overcome the need for a central infrastructure. In our previous works, the effects of the presence of malicious nodes on the performance of Ad-hoc networks have been reported. Based on the results of those works, here an approach that utilizes the behaviour history of the network nodes is proposed. In this approach, the main aim is to identify a route from source to destination that is free of malicious nodes. Several simulation studies were conducted to investigate the effect of the proposed behaviour approach on the performance of wireless Ad-hoc networks. Results that are carried out using OPtimised NETwork (OPNET) simulator show that the overall performance of the Ad-hoc networks, even in the presence of malicious nodes, can be significantly improved by incorporating the proposed approach.
Original languageEnglish
Title of host publication8th IBIMA International Conference on Information Management in the Networked Economy
PublisherInternational Business Information Management Association
Number of pages7
ISBN (Print)0975339370
Publication statusPublished - 2007
EventInternational Business Information Management Association. Conference -
Duration: 12 Nov 2012 → …

Conference

ConferenceInternational Business Information Management Association. Conference
Period12/11/12 → …

Keywords

  • computer networks
  • data protection
  • computer security
  • ad-hoc networks (computer networks)
  • packet switching (data transmission)
  • wireless communication systems

Fingerprint

Dive into the research topics of 'Utilising behaviour history to fight malicious nodes in wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this