Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Malicious packet dropping: how it might impact the TCP performance and how we can detect it
ICNP '00 Proceedings of the 2000 International Conference on Network Protocols
Tamper Resistance Mechanisms for Secure, Embedded Systems
VLSID '04 Proceedings of the 17th International Conference on VLSI Design
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
On TCP performance in a heterogeneous network: a survey
IEEE Communications Magazine
Hi-index | 0.00 |
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can dramatically decrease the performance of ad hoc network. Detecting and isolating the misbehaving nodes can not only make sure the participating nodes forward and route packets correctly, but also discourage the individual nodes from gaining advantages by not providing services to other nodes. This paper proposes a novel hardware assisted scheme which can detect one kind of misbehavior: selfish nodes. The proposed scheme consists of two timers that help to detect 80% or more selfish nodes with a probability of nearly 90%. The detection results could be used by other nodes to disengage the selfish nodes from the network. Furthermore, the virtue of hardware based detection makes this scheme less prone to virus influence as in some software based schemes.