Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks

被引:0
|
作者
Gopal, R. [1 ]
Parthasarathy, V. [1 ]
Mani, A. [1 ]
机构
[1] Chettinad Coll Engg & Tech, Dept CSE, Karur, Tamil Nadu, India
关键词
Cooperative; Malicious; Wireless; Technique; Reputation; Ns2; Consensus; CoopMAC; Confidant;
D O I
暂无
中图分类号
R-058 [];
学科分类号
摘要
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 404 - 406
  • [2] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    [J]. 2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524
  • [3] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [4] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [5] Locating Malicious Nodes for Data Aggregation in Wireless Networks
    Xu, Xiaohua
    Wang, Qian
    Cao, Jiannong
    Wan, Peng-Jun
    Ren, Kui
    Chen, Yuanfang
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3056 - 3060
  • [6] Crosscheck mechanism to identify malicious nodes in ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 45 - 54
  • [7] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [8] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
  • [9] Cooperative sensing method considering malicious nodes in cognitive radio networks
    Qi, Xiao-Gang
    Zheng, Sheng-Yu
    Liu, Li-Fang
    Wang, Hui-Fang
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36 (06):
  • [10] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,