Collaborative strategies for reducing attacks on ad hoc network nodes

被引:0
|
作者
McGibney, Jimmy [1 ]
Botvich, Dmitri [1 ]
机构
[1] Watford Inst Technol, Waterford, Ireland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is focused on the integration of strategies for managing trust in ad hoc and other unstructured networks and services. A general trust overlay architecture and model are provided, and the integration of a range of strategies is discussed. These include strategies for efficient exchange of trust information as well as for individual nodes to capture and use this information in making security decisions. Results are presented of simulations that assess the effectiveness of these strategies in ad hoc networks. Of particular interest is the robustness of the trust system when faced with malicious nodes that attempt to corrupt the system, possibly in collusion with each other.
引用
收藏
页码:3798 / 3802
页数:5
相关论文
共 50 条
  • [41] A MAC protocol for the mixed scenario of omnidirectional and directional nodes in an ad hoc network
    Alam, Md. Nasre
    Hussain, Md. Asdaque
    Khan, Pervez
    Kim, Baek-Hyun
    Kwak, Kyung Sup
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3720 - 3737
  • [42] Deployment of Ad Hoc Network Nodes Using UAVs for Search and Rescue Missions
    Wzorek, Mariusz
    Berger, Cyrille
    Rudol, Piotr
    Doherty, Patrick
    2018 6TH INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2018,
  • [43] Prevention of Malicious Nodes Using Genetic Algorithm in Vehicular Ad Hoc Network
    Khurana, Chetna
    Yadav, Pradeep
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 700 - 705
  • [44] Method on fast DOA estimation of moving nodes in ad-hoc network
    Guo, Y
    Guo, L
    Li, N
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1130 - 1133
  • [45] The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network
    Hazzaa, Firas
    Yousef, Sufian
    Ali, Nada H.
    Sanchez, Erika
    PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 215 - 218
  • [46] A Survey on Network Layer Attacks and AODV Defense in Mobile Ad hoc Networks
    Saeed, Amna
    Raza, Asad
    Abbas, Haider
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 185 - 191
  • [47] Research on a fast DOA estimation algorithm of moving nodes in ad hoc network
    Zhu, Qing-Hua
    Qin, Wei-Ping
    Guo, Yan
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 49 - 53
  • [48] Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks
    Sbai, Oussama
    Elboukhari, Mohamed
    NETWORKING, INTELLIGENT SYSTEMS AND SECURITY, 2022, 237 : 381 - 392
  • [49] A New Authentication Solution for Prevention of Some Typical Attacks in Ad Hoc Network
    Liu, Haiyan
    Bao, Kongjun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 333 - 344
  • [50] Analyzing attacks in wireless ad hoc network with self-organizing maps
    Avram, Traian
    Oh, Seungchan
    Hariri, Salim
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 166 - +