Paper
2 May 2007 Detecting and isolating malicious nodes in wireless ad hoc networks
Author Affiliations +
Abstract
Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fanzhi Li and Sabah Jassim "Detecting and isolating malicious nodes in wireless ad hoc networks", Proc. SPIE 6579, Mobile Multimedia/Image Processing for Military and Security Applications 2007, 657909 (2 May 2007); https://doi.org/10.1117/12.723953
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer simulations

Network security

Cryptography

Mobile communications

Biometrics

Cell phones

Data transmission

Back to Top