Collaborative strategies for reducing attacks on ad hoc network nodes

被引:0
|
作者
McGibney, Jimmy [1 ]
Botvich, Dmitri [1 ]
机构
[1] Watford Inst Technol, Waterford, Ireland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is focused on the integration of strategies for managing trust in ad hoc and other unstructured networks and services. A general trust overlay architecture and model are provided, and the integration of a range of strategies is discussed. These include strategies for efficient exchange of trust information as well as for individual nodes to capture and use this information in making security decisions. Results are presented of simulations that assess the effectiveness of these strategies in ad hoc networks. Of particular interest is the robustness of the trust system when faced with malicious nodes that attempt to corrupt the system, possibly in collusion with each other.
引用
收藏
页码:3798 / 3802
页数:5
相关论文
共 50 条
  • [1] Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
    Bhargava, Bharat
    de Oliveira, Ruy
    Zhang, Yu
    Idika, Nwokedi C.
    ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 447 - 450
  • [2] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [3] An Algorithm to Detect Attacks in Mobile Ad Hoc Network
    Saini, Radhika
    Khari, Manju
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 336 - 341
  • [4] State Analysis of Mobile Ad Hoc Network Nodes
    Jim, Lincy Elizabeth
    Gregory, Mark A.
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 314 - 319
  • [5] Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste
    Rafiullah Khan
    Sarmad Ullah Khan
    Digital Communications and Networks, 2017, 3 (02) : 118 - 128
  • [6] Critical nodes detection in mobile Ad Hoc network
    Sheng, Min
    Li, Jiandong
    Shi, Yan
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 336 - +
  • [7] The number of necessary nodes for Ad Hoc network areas
    Kim, Youngrag
    Dehkanov, Shuhrat
    Park, Heejoo
    Kim, Jaeil
    Kim, Chonggun
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 146 - +
  • [8] Dynamic Nodes Partition Algorithm for Ad Hoc Network
    Liu Chengyu
    Zhao Lina
    Liu Changchun
    Wei Shoushui
    CHINA COMMUNICATIONS, 2011, 8 (08) : 44 - 48
  • [9] Analysis of an Ad Hoc Network with Autonomously Moving Nodes
    Goebel, J.
    Krzesinski, A. E.
    Mandjes, A.
    2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 52 - +
  • [10] Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste
    Khan, Rafiullah
    Khan, Sarmad Ullah
    DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (02) : 118 - 128