Journal ArticleDOI
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
TLDR
This paper has proposed an approach to verify the correct forwarding of packets by an intermediate node, and compared it with the watchdog and the 2-hop ACK which are well-known approaches in the literature.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2012-05-01. It has received 60 citations till now. The article focuses on the topics: Wireless ad hoc network & Optimized Link State Routing Protocol.read more
Citations
More filters
Journal ArticleDOI
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Sunil Kumar,Kamlesh Dutta +1 more
TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
Proceedings ArticleDOI
Detection of malicious attack in MANET a behavioral approach
Meenakshi Patel,Sanjay Sharma +1 more
TL;DR: This paper projected a novel automatic security mechanism using SVM to defense against malicious attack occurring in AODV and introduced new proposed algorithm for detection of attacks in Ad-hoc networks based on SVM behavioral routing protocols to detect MANET attacks.
Journal ArticleDOI
A Cooperative Routing for MANET Based on Distributed Trust and Energy Management
TL;DR: The proposed algorithm, Trust and Energy based Ad hoc On Demand Distance Vector improves the traditional AODV algorithm by the dynamic incorporation of trust and energy values for each node in the topology in order to achieve cooperative routing.
Journal ArticleDOI
A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET
Shashi Gurung,Siddhartha Chauhan +1 more
TL;DR: Through simulation, it has been found that MBDP-AODV protocol is able to mitigate the impact of black-hole attack under different network density.
Journal ArticleDOI
A taxonomy on misbehaving nodes in delay tolerant networks
Waqar Khalid,Zahid Ullah,Naveed Ahmed,Yue Cao,Muhammad Khalid,Muhammad Arshad,Farhan Ammar Ahmad,Haitham Cruickshank +7 more
TL;DR: Delays Tolerant Networks are type of Intermittently Connected Networks featured by long delay, intermittent connectivity, asymmetric data rates and high error rates, and a review of misbehaving node attacks, and detection algorithms is presented.
References
More filters
Ad hoc On-Demand Distance Vector (AODV) Routing
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Optimized Link State Routing Protocol (OLSR)
Thomas Clausen,Philippe Jacquet +1 more
TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).
Proceedings ArticleDOI
Mitigating routing misbehavior in mobile ad hoc networks
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book ChapterDOI
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Pietro Michiardi,Refik Molva +1 more
TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Proceedings ArticleDOI
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks
Sheng Zhong,J. Chen,Yang Yang +2 more
TL;DR: In this paper, a simple, cheat-proof, credit-based system for stimulating cooperation among selfish nodes in mobile ad hoc networks is proposed, which does not require any tamper-proof hardware at any node.
Related Papers (5)
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Pietro Michiardi,Refik Molva +1 more