An efficient scheme for detecting malicious nodes in mobile ad hoc networks

Jongoh Choi, Si Ho Cha, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2006
Subtitle of host publication9th International Conference, Proceedings
PublisherSpringer Verlag
Pages179-193
Number of pages15
ISBN (Print)3540491120, 9783540491125
DOIs
Publication statusPublished - 2006
EventICISC 2006: 9th International Conference on Information Security and Cryptology - Busan, Korea, Republic of
Duration: 2006 Nov 302006 Dec 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4296 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICISC 2006: 9th International Conference on Information Security and Cryptology
Country/TerritoryKorea, Republic of
CityBusan
Period06/11/3006/12/1

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'An efficient scheme for detecting malicious nodes in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this