• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 331
Next 10 →

On the Effect of Node Misbehavior in Ad Hoc Networks

by Matthias Hollick, Jens Schmitt, Christian Seipl, Ralf Steinmetz - Proceedings of IEEE International Conference on Communications, ICC'04 , 2004
"... Abstract-- The dependability of the routing system in ad hoc networks inherently relies on node behavior. In order to support multi-hop operation in the network, most ad hoc routing algorithms assume well-behaving nodes. However, in reality there may exist constrained, selfish or malicious nodes. We ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
. We discuss the influence of node misbehavior on the routing process. In particular, we derive a classification for misbehaving nodes and extend an analytical model of the route acquisition process executed by the Ad hoc On-demand Distance Vector (AODV) routing protocol to cover different classes

Detection and avoidance of node misbehavior in MANET based on CLAODV

by S. Usha, S. Radha , 1340
"... This paper depicts a model which not only evaluates the node’s reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper mod ..."
Abstract - Add to MetaCart
models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation

Detecting Node Misbehavior in Ad hoc Networks

by M. Tamer Refaei, Yanxia Rong, Luiz A. Dasilva, Hyeong-ah Choi
"... Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this paper, we develop a model based on the Sequential Probability Ratio Test to characterize how nodes can differentiate between ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this paper, we develop a model based on the Sequential Probability Ratio Test to characterize how nodes can differentiate

On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures

by Fei Xing, Student Member, Wenye Wang Member - IEEE Transactions on Dependable and Secure Computing , 2010
"... Abstract—Network survivability is the ability of a network keeping connected under failures and attacks, which is a fun-damental issue to the design and performance evaluation of wireless ad hoc networks. In this paper, we focus on the analysis of network survivability in the presence of node misbeh ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
misbehaviors and failures. First, we propose a novel semi-Markov process model to characterize the evolution of node behaviors. As an immediate application of the proposed model, we investigate the problem of node isolation where the effects of Denial-of-Service (DoS) attacks are considered. Then we present

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

by Manoj Kumar Mishra, Binod Kumar Pattanayak, Alok Kumar Jagadev, Manojranjan Nayak, Jagamohan Nagar, Jagamohan Nagar
"... The major challenge to design and deployment of mobile ad hoc networks (MANETs) is its dynamic nature, which carries with itself a set of security measures to be resolved. In this paper, we compare the behavior of three routing protocols DSDV, DSR and AODV under security attack, where the investigat ..."
Abstract - Add to MetaCart
the investigation is carried out with respect to two types of node misbehavior. The parameters taken into consideration for evaluation of network performance are normalized throughput, routing overhead, normalized routing load and average packet delay, when a certain percentage of nodes misbehave. It could

A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET

by Ramasamy Murugan, Arumugam Shanmugam , 2011
"... The nodes in the network that causes dysfunction in network and damage to the other node are misbehaving nodes. They support the flow of route discovery traffic but interrupt the data flow causing the routing protocol to restart the route discovery process. In this paper, an efficient timer based ac ..."
Abstract - Add to MetaCart
reducing the delay and overhead. This approach is keenly focusing on acknowledgement of nodes regarding the misbehaviors so that the source takes the corresponding action. Simulation results show that the timer based acknowledgement scheme attains good packet delivery ratio with reduced packet drop, delay

Analyzing Resilience to Node Misbehaviors in Wireless Multi-hop Networks

by Fei Xing, Wenye Wang
"... Abstract — The network resilience has been studied as a fault tolerance measure in wired networks for decades; however, little effort has been made to analyze the resilience of wireless multihop networks, especially in the presence of misbehaving nodes. In this work, we study such a problem: whether ..."
Abstract - Add to MetaCart
Abstract — The network resilience has been studied as a fault tolerance measure in wired networks for decades; however, little effort has been made to analyze the resilience of wireless multihop networks, especially in the presence of misbehaving nodes. In this work, we study such a problem

Mitigating routing misbehavior in mobile ad hoc networks

by Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker - Proc. ACM/IEEE MOBICOM , 2000
"... This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies misb ..."
Abstract - Cited by 1090 (4 self) - Add to MetaCart
This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies

978-1-4799-0059-6/13/$31.00 ©2013 IEEE Nodes ’ Misbehavior in Vehicular Delay-Tolerant Networks

by Naércio Magaia, Paulo Rogério Pereira, Miguel P. Correia
"... composed of mobile nodes that communicate wirelessly with each other to forward data despite connectivity issues. This paper focuses on the problem of some nodes trying to impair the communication of a VDTN. In the paper we study the case of nodes that delay the forwarding of messages that is a part ..."
Abstract - Add to MetaCart
help routing protocols to be resilient to node misbehavior.

REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits

by William Kozma, Loukas Lazos - In WiSec , 2009
"... Wireless ad hoc networks rely on multi-hop routes to trans-port data from source to destination. The routing function is implemented in a collaborative manner, with each node re-sponsible for relaying traffic to the destination. However, an increasingly sophisticated pool of users with easy access t ..."
Abstract - Cited by 15 (3 self) - Add to MetaCart
to commercial wireless devices, combined with the poor phys-ical and software security of the devices, can lead to node misconfiguration or misbehavior. A misbehaving node may refuse to forward packets in order to conserve its energy (selfishness), or simply degrade network performance (mali
Next 10 →
Results 1 - 10 of 331
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University