DocumentCode :
1804587
Title :
Policy-Based Malicious Peer Detection in Ad Hoc Networks
Author :
Li, Wenjia ; Joshi, Anupam ; Finin, Tim
Author_Institution :
Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland, Baltimore, MD, USA
Volume :
3
fYear :
2009
fDate :
29-31 Aug. 2009
Firstpage :
76
Lastpage :
82
Abstract :
Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and develop a policy-based malicious peer detection mechanism, in which context information, such as communication channel status, buffer status, and transmission power level, is collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the policy-based malicious peer detection mechanism is able to distinguish malicious peers from faulty peers with high confidence. Moreover, the mechanism converges to a consistent view of malicious nodes amongst all the nodes with a limited communication overhead.
Keywords :
ad hoc networks; mobile radio; telecommunication network topology; telecommunication security; wireless channels; MANET; buffer status; communication channel status; error-prone transmission media; highly dynamic network topology; misbehavior detection; mobile ad hoc network; policy-based malicious peer detection; rigorous power constraint; Ad hoc networks; Communication channels; Computer networks; Context; Fault detection; Mobile ad hoc networks; Network topology; Peer to peer computing; Protection; Working environment noise;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Science and Engineering, 2009. CSE '09. International Conference on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4244-5334-4
Electronic_ISBN :
978-0-7695-3823-5
Type :
conf
DOI :
10.1109/CSE.2009.289
Filename :
5283307
Link To Document :
بازگشت