Advanced detection of selfish or malicious nodes in ad hoc networks

作者: Frank Kargl , Andreas Klenk , Stefan Schlott , Michael Weber

DOI: 10.1007/978-3-540-30496-8_13

关键词: Wireless networkMobile ad hoc networkComputer securityIntrusion detection systemComputer scienceComputer networkWireless ad hoc networkMobile computingSelfishnessNode (networking)

摘要: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) widely acknowledged. One of the different kinds misbehavior node may exhibit selfishness. A selfish wants to preserve own resources while using services others and consuming their resources. way preventing selfishness in MANET detection exclusion mechanism. In this paper, we focus on phase present sensors can be used find nodes. First simulation results show negative effects which nodes cause MANET. related work section will analyze some mechanisms proposed literature so far. Our new described next are called activity-based overhearing, iterative probing, unambiguous probing. Simulation-based analysis these they highly effective reliably detect multitude behaviors.

参考文章(29)
Frank Kargl, Sicherheit in Mobilen Ad hoc Netzwerken Ausgezeichnete Informatikdissertationen. pp. 79- 90 ,(2004) , 10.18725/OPARU-37
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
P. Papadimitratos, Z.J. Haas, Secure link state routing for mobile ad hoc networks symposium on applications and the internet. pp. 379- 383 ,(2003) , 10.1109/SAINTW.2003.1210190
Markus Kuhn, Ross Anderson, Tamper resistance: a cautionary note WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 1- 1 ,(1996)
David A. Maltz, David B. Johnson, Josh Broch, DSR: the dynamic source routing protocol for multihop wireless ad hoc networks Ad hoc networking. pp. 139- 172 ,(2001)
Manel Guerrero Zapata, Secure ad hoc on-demand distance vector routing Mobile Computing and Communications Review. ,vol. 6, pp. 106- 107 ,(2002) , 10.1145/581291.581312
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958