Share Email Print

Proceedings Paper

Detecting and isolating malicious nodes in wireless ad hoc networks
Author(s): Fanzhi Li; Sabah Jassim
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.

Paper Details

Date Published: 2 May 2007
PDF: 7 pages
Proc. SPIE 6579, Mobile Multimedia/Image Processing for Military and Security Applications 2007, 657909 (2 May 2007); doi: 10.1117/12.723953
Show Author Affiliations
Fanzhi Li, Univ. of Buckingham (United Kingdom)
Sabah Jassim, Univ. of Buckingham (United Kingdom)

Published in SPIE Proceedings Vol. 6579:
Mobile Multimedia/Image Processing for Military and Security Applications 2007
Sos S. Agaian; Sabah A. Jassim, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?