Share Email Print

Proceedings Paper

Malicious node detection in ad hoc wireless networks
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Advances in wireless communications and the proliferation of mobile computing devices has led to the rise of a new type of computer network: the ad-hoc wireless network. Ad-hoc networks are characterized by a lack of fixed infrastructure, which give ad-hoc networks a great deal of flexibility, but also increases the risk of security problems. In wired networks, key pieces of network infrastructure are secured to prevent unauthorized physical access and tampering. Network administrators ensure that everything is properly configured and are on-hand to fix problems and deal with intrusions. In contrast, the nodes in an ad-hoc network are responsible for routing and forwarding data in the network, and there are no network administrators to handle potential problems. This makes an ad-hoc network more vulnerable to a misconfigured, faulty, or compromised node. We propose a means for a node in an ad-hoc network to detect and handle these malicious nodes by comparing data available to the routing protocol, such as cached routes in Dynamic Source Routing, ICMP messages, and transport layer information, such as TCP timeouts. This data can then be used along with network probes to isolate the malicious node.

Paper Details

Date Published: 23 July 2003
PDF: 11 pages
Proc. SPIE 5100, Digital Wireless Communications V, (23 July 2003); doi: 10.1117/12.485911
Show Author Affiliations
Richard L. Griswold, Washington State Univ. (United States)
Sirisha R. Medidi, Washington State Univ. (United States)

Published in SPIE Proceedings Vol. 5100:
Digital Wireless Communications V
Raghuveer M. Rao; Soheil A. Dianat; Michael D. Zoltowski, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?