• DocumentCode
    1804587
  • Title

    Policy-Based Malicious Peer Detection in Ad Hoc Networks

  • Author

    Li, Wenjia ; Joshi, Anupam ; Finin, Tim

  • Author_Institution
    Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland, Baltimore, MD, USA
  • Volume
    3
  • fYear
    2009
  • fDate
    29-31 Aug. 2009
  • Firstpage
    76
  • Lastpage
    82
  • Abstract
    Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and develop a policy-based malicious peer detection mechanism, in which context information, such as communication channel status, buffer status, and transmission power level, is collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the policy-based malicious peer detection mechanism is able to distinguish malicious peers from faulty peers with high confidence. Moreover, the mechanism converges to a consistent view of malicious nodes amongst all the nodes with a limited communication overhead.
  • Keywords
    ad hoc networks; mobile radio; telecommunication network topology; telecommunication security; wireless channels; MANET; buffer status; communication channel status; error-prone transmission media; highly dynamic network topology; misbehavior detection; mobile ad hoc network; policy-based malicious peer detection; rigorous power constraint; Ad hoc networks; Communication channels; Computer networks; Context; Fault detection; Mobile ad hoc networks; Network topology; Peer to peer computing; Protection; Working environment noise;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Science and Engineering, 2009. CSE '09. International Conference on
  • Conference_Location
    Vancouver, BC
  • Print_ISBN
    978-1-4244-5334-4
  • Electronic_ISBN
    978-0-7695-3823-5
  • Type

    conf

  • DOI
    10.1109/CSE.2009.289
  • Filename
    5283307