Detecting Selfish and Malicious Nodes in MANETs
نویسنده
چکیده
Mobile ad-hoc networks (MANETs) rely on cooperation of all participating nodes. Thus they are vulnerable to selfish nodes using the net without providing own ressources, as well as malicious nodes attacking the net infrastructure. This paper outlines important attacks and summarizes popular approaches to design secure MANET protocols in order to detect selfish and malicious nodes and to enforce cooperation.
منابع مشابه
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملAn Overview of Game Theoretic Approach to Intrusion Detection System in MANETs
Mobile ad hoc networks (MANETs) are a collection of mobile nodes that communicates over wireless media. Performance of MANET depends on the cooperative participation of nodes in packet forwarding. During packet forwarding from source to destination, it takes help of middle hop depending on the distance. Middle hops play different role in different times. Nodes in MANETs suffer from limited reso...
متن کاملA Survey on Efficient Detection of Selfish Nodes in MANET using A Collaborative Watchdog
Misbehavior of Nodes is basically due to selfish or faulty nodes or malicious reasons can degrade the performance of Mobile ad-hoc networks (MANETs). To handle with misbehaviour in such self-organised networks, nodes need to adapt their strategy to changing levels of cooperation. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node beha...
متن کاملDetection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. For example, misbehaving nodes can cause general network disruption by not forwarding packets on behalf of other nodes in the network. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006