@inproceedings{64904424dbf04a338e42429fca76bf21,
title = "An efficient scheme for detecting malicious nodes in mobile ad hoc networks",
abstract = "This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.",
author = "Jongoh Choi and Cha, {Si Ho} and Jooseok Song",
year = "2006",
doi = "10.1007/11927587_16",
language = "English",
isbn = "3540491120",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "179--193",
booktitle = "Information Security and Cryptology - ICISC 2006",
address = "Germany",
note = "ICISC 2006: 9th International Conference on Information Security and Cryptology ; Conference date: 30-11-2006 Through 01-12-2006",
}