DocumentCode
597693
Title
Techniques to identify and eliminate malicious nodes in cooperative wireless networks
Author
Gopal, Rajeev ; Parthasarathy, V. ; Mani, Ankur
Author_Institution
Dept. of CSE, Chettinad Coll. of Eng. & Tech, Karur, India
fYear
2013
fDate
4-6 Jan. 2013
Firstpage
1
Lastpage
4
Abstract
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
Keywords
radio networks; routing protocols; telecommunication security; NS2; cooperative wireless networks; malicious nodes; routing protocols; Ad hoc networks; Automatic repeat request; Computers; Informatics; Monitoring; Protocols; Wireless networks; Confidant; Consensus; CoopMAC; Cooperative; Malicious; Ns2; Reputation; Technique; Wireless;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communication and Informatics (ICCCI), 2013 International Conference on
Conference_Location
Coimbatore
Print_ISBN
978-1-4673-2906-4
Type
conf
DOI
10.1109/ICCCI.2013.6466125
Filename
6466125
Link To Document