Utilizing behaviour history to fight malicious nodes in wireless Ad-hoc networks

Houssein Hallani, Seyed A. Shahrestani

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

5 Citations (Scopus)

Abstract

Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooperation amongst themselves; they overcome the need for a central infrastructure. In our previous works, the effects of the presence of malicious nodes on the performance of Ad-hoc networks have been reported. Based on the results of those works, here an approach that utilizes the behaviour history of the network nodes is proposed. In this approach, the main aim is to identify a route from source to destination that is free of malicious nodes. Several simulation studies were conducted to investigate the effect of the proposed behaviour approach on the performance of wireless Ad-hoc networks. Results that are carried out using OPtimised NETwork (OPNET) simulator show that the overall performance of the Ad-hoc networks, even in the presence of malicious nodes, can be significantly improved by incorporating the proposed approach.

Original languageEnglish
Title of host publicationInformation Management in the Networked Economy
Subtitle of host publicationIssues and Solutions - Proceedings of the 8th International Business Information Management Association Conference, IBIMA 2007
PublisherInternational Business Information Management Association, IBIMA
Pages81-87
Number of pages7
ISBN (Print)9780975339374
Publication statusPublished - 2007
Event8th International Business Information Management Association Conference, IBIMA 2007 - Dublin, Ireland
Duration: 20 Jun 200722 Jun 2007

Publication series

NameInformation Management in the Networked Economy: Issues and Solutions - Proceedings of the 8th International Business Information Management Association Conference, IBIMA 2007

Conference

Conference8th International Business Information Management Association Conference, IBIMA 2007
Country/TerritoryIreland
CityDublin
Period20/06/0722/06/07

Keywords

  • Ad-hoc networks
  • Malicious nodes
  • Network performance simulation
  • Packet loss
  • Performance analysis
  • Round-trip delay
  • Throughput

Fingerprint

Dive into the research topics of 'Utilizing behaviour history to fight malicious nodes in wireless Ad-hoc networks'. Together they form a unique fingerprint.

Cite this