Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A Link Adaptation Scheme for Improving Throughput in the IEEE 802.11 Wireless LAN
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
On Using Reputations in Ad hoc Networks to Counter Malicious Nodes
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
Secure Routing and Intrusion Detection in Ad Hoc Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
A Framework for Key Management in Mobile Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
An efficient zone-based multicast routing protocol for ad hoc network
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
Ad-hoc networks are a collection of mobile nodes that can be deployed without the need for any centralized management infrastructure. As such, the very basic operation of these networks is dependent on the cooperation of their nodes to provide communication routes. Furthermore, such networks are prone to several security risks. Consequently, when some nodes behave maliciously or in a selfish manner, the operation of the whole network can be severely affected. The behavior of such nodes can result in degradation of the performance of the network or even disruption of its operation altogether. This work reports the results of studying the Ad-hoc network performance in the presence of malicious nodes. It also proposes an approach that takes the behaviour history of member nodes into account, to improve network reliability. The reported approach, namely Behavior Ad-hoc On Demand Distance Vector approach, is based on discovery of communication paths with minimal number of selfish or malicious nodes. Using OPNET simulator, several situations of practical significance have been studied and analyzed. The results of these studies show that by applying the proposed approach, marked improvements in the performance and reliability of the Ad-hoc networks depend on AODV protocol can be achieved.