Wireless ad-hoc networks : employing behaviour history to combat malicious nodes

Houssein Hallani, Seyed A. Shahrestani, Beata J. Wysocki, Tadeusz A. Wysocki

Research output: Chapter in Book / Conference PaperConference Paper

Abstract

The presence of malicious nodes in Ad-hoc networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. This paper investigates this topic further and proposes some approaches to mitigate the consequences of the presence of the malicious nodes in Ad-hoc networks. Experimental and simulation results that show the effect of such nodes on the performance of the network are reported and analyzed. To achieve higher levels of security and reliability, an approach that is based on the utilization of past behaviour of all member nodes is investigated and reported. The main goal for this approach is to identify routes between the source and the destination, which excludes and if not possible, minimizes the number of malicious node in the routes. The advantages of this approach are also compared with the traditional approaches that tend to use other criteria such as shortest path alone. Using OPNET simulator, the proposed approach is validated and further studied. The findings show that when the proposed approach is utilized, the overall performance of the Ad-hoc network is significantly improved.
Original languageEnglish
Title of host publicationInternational Conference on Signal Processing and Communication Systems, ICSPCS'2007, Australia, Gold Coast, 17-19 Dec. 2007 : Proceedings
PublisherDSP for Communication Systems
Number of pages1
ISBN (Electronic)9780975693445
ISBN (Print)9780975693438
Publication statusPublished - 2008
EventInternational Conference on Signal Processing and Telecommunication Systems -
Duration: 1 Jan 2008 → …

Conference

ConferenceInternational Conference on Signal Processing and Telecommunication Systems
Period1/01/08 → …

Keywords

  • computer networks
  • data protection
  • computer security
  • ad-hoc networks (computer networks)
  • behavior
  • wireless communication systems

Fingerprint

Dive into the research topics of 'Wireless ad-hoc networks : employing behaviour history to combat malicious nodes'. Together they form a unique fingerprint.

Cite this