Wireless ad-hoc networks : employing behaviour history to combat malicious nodes

Houssein Hallani, Seyed A. Shahrestani, Beata J. Wysocki, Tadeusz A. Wysocki

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[The presence of malicious nodes in Ad-hoc networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. This paper investigates this topic further and proposes some approaches to mitigate the consequences of the presence of the malicious nodes in Ad-hoc networks. Experimental and simulation results that show the effect of such nodes on the performance of the network are reported and analyzed. To achieve higher levels of security and reliability, an approach that is based on the utilization of past behaviour of all member nodes is investigated and reported. The main goal for this approach is to identify routes between the source and the destination, which excludes and if not possible, minimizes the number of malicious node in the routes. The advantages of this approach are also compared with the traditional approaches that tend to use other criteria such as shortest path alone. Using OPNET simulator, the proposed approach is validated and further studied. The findings show that when the proposed approach is utilized, the overall performance of the Ad-hoc network is significantly improved.]]
    Original languageEnglish
    Title of host publicationInternational Conference on Signal Processing and Communication Systems, ICSPCS'2007, Australia, Gold Coast, 17-19 Dec. 2007 : Proceedings
    PublisherDSP for Communication Systems
    Number of pages1
    ISBN (Electronic)9780975693445
    ISBN (Print)9780975693438
    Publication statusPublished - 2008
    EventInternational Conference on Signal Processing and Telecommunication Systems -
    Duration: 1 Jan 2008 → …

    Conference

    ConferenceInternational Conference on Signal Processing and Telecommunication Systems
    Period1/01/08 → …

    Keywords

    • computer networks
    • data protection
    • computer security
    • ad-hoc networks (computer networks)
    • behavior
    • wireless communication systems

    Fingerprint

    Dive into the research topics of 'Wireless ad-hoc networks : employing behaviour history to combat malicious nodes'. Together they form a unique fingerprint.

    Cite this