Paper
2 May 2006 The effects of malicious nodes on performance of mobile ad hoc networks
Fanzhi Li, Xiyu Shi, Sabah Jassim, Christopher Adams
Author Affiliations +
Abstract
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fanzhi Li, Xiyu Shi, Sabah Jassim, and Christopher Adams "The effects of malicious nodes on performance of mobile ad hoc networks", Proc. SPIE 6250, Mobile Multimedia/Image Processing for Military and Security Applications, 62500K (2 May 2006); https://doi.org/10.1117/12.668263
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Biometrics

Computer simulations

Personal digital assistants

Relays

Databases

Video

RELATED CONTENT


Back to Top