• DocumentCode
    597693
  • Title

    Techniques to identify and eliminate malicious nodes in cooperative wireless networks

  • Author

    Gopal, Rajeev ; Parthasarathy, V. ; Mani, Ankur

  • Author_Institution
    Dept. of CSE, Chettinad Coll. of Eng. & Tech, Karur, India
  • fYear
    2013
  • fDate
    4-6 Jan. 2013
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
  • Keywords
    radio networks; routing protocols; telecommunication security; NS2; cooperative wireless networks; malicious nodes; routing protocols; Ad hoc networks; Automatic repeat request; Computers; Informatics; Monitoring; Protocols; Wireless networks; Confidant; Consensus; CoopMAC; Cooperative; Malicious; Ns2; Reputation; Technique; Wireless;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communication and Informatics (ICCCI), 2013 International Conference on
  • Conference_Location
    Coimbatore
  • Print_ISBN
    978-1-4673-2906-4
  • Type

    conf

  • DOI
    10.1109/ICCCI.2013.6466125
  • Filename
    6466125