DocumentCode :
597693
Title :
Techniques to identify and eliminate malicious nodes in cooperative wireless networks
Author :
Gopal, Rajeev ; Parthasarathy, V. ; Mani, Ankur
Author_Institution :
Dept. of CSE, Chettinad Coll. of Eng. & Tech, Karur, India
fYear :
2013
fDate :
4-6 Jan. 2013
Firstpage :
1
Lastpage :
4
Abstract :
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
Keywords :
radio networks; routing protocols; telecommunication security; NS2; cooperative wireless networks; malicious nodes; routing protocols; Ad hoc networks; Automatic repeat request; Computers; Informatics; Monitoring; Protocols; Wireless networks; Confidant; Consensus; CoopMAC; Cooperative; Malicious; Ns2; Reputation; Technique; Wireless;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communication and Informatics (ICCCI), 2013 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4673-2906-4
Type :
conf
DOI :
10.1109/ICCCI.2013.6466125
Filename :
6466125
Link To Document :
بازگشت