Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Property Based Intrusion Detection to Secure OLSR
ICWMC '07 Proceedings of the Third International Conference on Wireless and Mobile Communications
Introduction to Network Simulator NS2
Introduction to Network Simulator NS2
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
An effective intrusion detection approach for OLSR MANET protocol
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Hi-index | 0.00 |
Routing in ad hoc networks is based on mutual trust between collaborating nodes. Security problems arise when supposedly honest nodes lie deliberately to maximize their profit. In this article, we are interested in detecting misbehaving nodes within the ad hoc routing protocol AODV. We propose and implement a real-time intrusion detection system based on implicit trust relations: a node implementing this system collects its neighbors' routing messages and reasons on them to decide on their honesty. We also evaluate our implementation, and, based on simulations, show that the system we have developed to detect dishonest behavior is efficient.