An efficient scheme for detecting malicious nodes in mobile ad hoc networks

Jongoh Choi, Si Ho Cha, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2006
Subtitle of host publication9th International Conference, Proceedings
Pages179-193
Number of pages15
Publication statusPublished - 2006 Dec 1
EventICISC 2006: 9th International Conference on Information Security and Cryptology - Busan, Korea, Republic of
Duration: 2006 Nov 302006 Dec 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4296 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICISC 2006: 9th International Conference on Information Security and Cryptology
CountryKorea, Republic of
CityBusan
Period06/11/3006/12/1

Fingerprint

Mobile ad hoc networks
Mobile Ad Hoc Networks
Data communication systems
Vertex of a graph
Table
Data Transmission
Routing

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Choi, J., Cha, S. H., & Song, J. S. (2006). An efficient scheme for detecting malicious nodes in mobile ad hoc networks. In Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings (pp. 179-193). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4296 LNCS).
Choi, Jongoh ; Cha, Si Ho ; Song, Joo Seok. / An efficient scheme for detecting malicious nodes in mobile ad hoc networks. Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. 2006. pp. 179-193 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{64904424dbf04a338e42429fca76bf21,
title = "An efficient scheme for detecting malicious nodes in mobile ad hoc networks",
abstract = "This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.",
author = "Jongoh Choi and Cha, {Si Ho} and Song, {Joo Seok}",
year = "2006",
month = "12",
day = "1",
language = "English",
isbn = "3540491120",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "179--193",
booktitle = "Information Security and Cryptology - ICISC 2006",

}

Choi, J, Cha, SH & Song, JS 2006, An efficient scheme for detecting malicious nodes in mobile ad hoc networks. in Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4296 LNCS, pp. 179-193, ICISC 2006: 9th International Conference on Information Security and Cryptology, Busan, Korea, Republic of, 06/11/30.

An efficient scheme for detecting malicious nodes in mobile ad hoc networks. / Choi, Jongoh; Cha, Si Ho; Song, Joo Seok.

Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. 2006. p. 179-193 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4296 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - An efficient scheme for detecting malicious nodes in mobile ad hoc networks

AU - Choi, Jongoh

AU - Cha, Si Ho

AU - Song, Joo Seok

PY - 2006/12/1

Y1 - 2006/12/1

N2 - This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.

AB - This paper proposes a scheme capable of effectively detecting a malicious node that normally operates during determination of a route over a mobile ad-hoc network (MANET) but modifies or drops data during data transmission or reports wrong information regarding a normal node, using a report message and a report table that list reporter nodes and suspect nodes. In the existing schemes, a malicious node that provides wrong information can be easily identified but cannot be removed from a network. To solve this problem, the proposed scheme determines a suspect node as a malicious node when more than k lists of reporter nodes and suspect nodes are recorded in the report table in case where k malicious nodes are over the network. The proposed scheme is applicable to both DSR and AODV routing.

UR - http://www.scopus.com/inward/record.url?scp=34547460208&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34547460208&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540491120

SN - 9783540491125

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 179

EP - 193

BT - Information Security and Cryptology - ICISC 2006

ER -

Choi J, Cha SH, Song JS. An efficient scheme for detecting malicious nodes in mobile ad hoc networks. In Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. 2006. p. 179-193. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).