A Probabilistic Energy-Efficient Approach for Monitoring and Detecting Malicious/Selfish Nodes in Mobile Ad-hoc Networks

被引:0
|
作者
Lupia, Andrea [1 ]
De Rango, Floriano [1 ]
机构
[1] Univ Calabria, DIMES Dept, Arcavacata Di Rende, CS, Italy
关键词
MANET; Ad-hoc; Security; Energy-Efficient; Consumption; Monitoring; Detection; Trust; ROUTING PROTOCOL; MODEL; PERFORMANCE; CONSUMPTION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become selfish under some conditions. Many proposals detect these behaviors using a trust management system, but the activity of packet monitoring is energy-consuming. The main aim of this proposal is the reduction of the energy required by the monitoring system without lowering detection performance. Various simulations show that the achievement of this result is obtained through the application of a probabilistic approach, having also better performance in terms of time needed to detect misbehaviors.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Way to Solve the Threat of Selfish and Malicious Nodes for Ad hoc Networks
    Wang, Xingfu
    Dai, Fuquan
    Qian, Lei
    Dong, Hao
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 368 - 370
  • [22] ENERGY EFFICIENT ROUTING IN MOBILE AD-HOC NETWORKS
    Choudhury, Debaditya
    Kar, Debanjana
    Biswas, Katha Roy
    Saha, Himadri Nath
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [23] A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks
    Guo, Ji
    Marshall, Alan
    Zhou, Bosheng
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 142 - 149
  • [24] Probabilistic Monitoring in Intrusion Detection Module for Energy Efficiency in Mobile Ad-hoc Networks
    De Rango, Floriano
    Lupia, Andrea
    UNMANNED SYSTEMS TECHNOLOGY XVIII, 2016, 9837
  • [25] Identifying Malicious Nodes in Mobile Ad-Hoc Networks using Polynomial Reduction Algorithm
    Varma, D. Arvind
    Narayanan, M.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1179 - 1184
  • [26] To Detect Malicious Nodes in the Mobile Ad-hoc Networks using Soft Computing Technique
    Kavitha, P.
    RajeswariMukesh
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1564 - 1573
  • [27] Effects of Malicious Attacks in Mobile Ad-hoc Networks
    Kanthe, Ashok M.
    Simunic, Dina
    Prasad, Ramjee
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 1 - 5
  • [28] Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach
    Younis, O
    Fahmy, S
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 629 - 640
  • [29] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [30] The impact of malicious nodes on the performance of wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +