23 July 2003 Malicious node detection in ad-hoc wireless networks
Author Affiliations +
Advances in wireless communications and the proliferation of mobile computing devices has led to the rise of a new type of computer network: the ad-hoc wireless network. Ad-hoc networks are characterized by a lack of fixed infrastructure, which give ad-hoc networks a great deal of flexibility, but also increases the risk of security problems. In wired networks, key pieces of network infrastructure are secured to prevent unauthorized physical access and tampering. Network administrators ensure that everything is properly configured and are on-hand to fix problems and deal with intrusions. In contrast, the nodes in an ad-hoc network are responsible for routing and forwarding data in the network, and there are no network administrators to handle potential problems. This makes an ad-hoc network more vulnerable to a misconfigured, faulty, or compromised node. We propose a means for a node in an ad-hoc network to detect and handle these malicious nodes by comparing data available to the routing protocol, such as cached routes in Dynamic Source Routing, ICMP messages, and transport layer information, such as TCP timeouts. This data can then be used along with network probes to isolate the malicious node.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Richard L. Griswold, Sirisha R. Medidi, "Malicious node detection in ad-hoc wireless networks", Proc. SPIE 5100, Digital Wireless Communications V, (23 July 2003); doi: 10.1117/12.485911; https://doi.org/10.1117/12.485911


Network systems security analysis
Proceedings of SPIE (May 14 2015)
Micromanaging the IoT space
Proceedings of SPIE (May 02 2017)
NetWall distributed firewall in the use of campus network
Proceedings of SPIE (October 29 2011)
Characterization of attacks on public telephone networks
Proceedings of SPIE (February 21 2001)

Back to Top