Title :
Techniques to identify and eliminate malicious nodes in cooperative wireless networks
Author :
Gopal, Rajeev ; Parthasarathy, V. ; Mani, Ankur
Author_Institution :
Dept. of CSE, Chettinad Coll. of Eng. & Tech, Karur, India
Abstract :
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
Keywords :
radio networks; routing protocols; telecommunication security; NS2; cooperative wireless networks; malicious nodes; routing protocols; Ad hoc networks; Automatic repeat request; Computers; Informatics; Monitoring; Protocols; Wireless networks; Confidant; Consensus; CoopMAC; Cooperative; Malicious; Ns2; Reputation; Technique; Wireless;
Conference_Titel :
Computer Communication and Informatics (ICCCI), 2013 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4673-2906-4
DOI :
10.1109/ICCCI.2013.6466125