Share Email Print
cover

Proceedings Paper

The effects of malicious nodes on performance of mobile ad hoc networks
Author(s): Fanzhi Li; Xiyu Shi; Sabah Jassim; Christopher Adams
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

Paper Details

Date Published: 2 May 2006
PDF: 6 pages
Proc. SPIE 6250, Mobile Multimedia/Image Processing for Military and Security Applications, 62500K (2 May 2006); doi: 10.1117/12.668263
Show Author Affiliations
Fanzhi Li, Univ. of Buckingham (United Kingdom)
Xiyu Shi, Univ. of Surrey (United Kingdom)
Sabah Jassim, Univ. of Buckingham (United Kingdom)
Christopher Adams, Univ. of Buckingham (United Kingdom)


Published in SPIE Proceedings Vol. 6250:
Mobile Multimedia/Image Processing for Military and Security Applications
Sos S. Agaian; Sabah A. Jassim, Editor(s)

© SPIE. Terms of Use
Back to Top