An efficient scheme for detecting malicious nodes in mobile ad hoc networks

Jongoh Choi, Si Ho Cha, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2006
Subtitle of host publication9th International Conference, Proceedings
Pages179-193
Number of pages15
Publication statusPublished - 2006 Dec 1
EventICISC 2006: 9th International Conference on Information Security and Cryptology - Busan, Korea, Republic of
Duration: 2006 Nov 302006 Dec 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4296 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICISC 2006: 9th International Conference on Information Security and Cryptology
CountryKorea, Republic of
CityBusan
Period06/11/3006/12/1

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'An efficient scheme for detecting malicious nodes in mobile ad hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Choi, J., Cha, S. H., & Song, J. (2006). An efficient scheme for detecting malicious nodes in mobile ad hoc networks. In Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings (pp. 179-193). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4296 LNCS).