Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Exploiting Omissive Faults in Synchronous Approximate Agreement
IEEE Transactions on Computers
A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks " How Much Can Watchdogs Really Do?
WMCSA '04 Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Hi-index | 0.00 |
Much research in ad hoc networks utilizes monitoring mechanisms to detect maliciously acting nodes. The faults that a system is exposed to range from simple omissions to packet manipulations and misrouting. Several monitoring techniques have been presented that address malicious behavior in specific environments, but each has their restrictive assumptions about detection and mitigation in hostile environments. We generalize the notion of malicious behavior of related research and outline a k-hop monitoring approach that allows us to drop many assumptions limiting previous work. Specifically, we include collaboration of malicious nodes, the presence of malicious nodes during neighborhood exploration, and misrouting. However, the approach exposes also the associated overhead in providing detection and correction thresholds.