Techniques to identify and eliminate malicious nodes in cooperative wireless networks

In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various...

Full description

Saved in:
Bibliographic Details
Published in2013 International Conference on Computer Communication and Informatics pp. 1 - 4
Main Authors Gopal, R., Parthasarathy, V., Mani, A.
Format Conference Proceeding Journal Article
LanguageEnglish
Published IEEE 01.01.2013
Subjects
Online AccessGet full text
ISBN1467329061
9781467329064
DOI10.1109/ICCCI.2013.6466125

Cover

More Information
Summary:In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Conference-1
ObjectType-Feature-3
content type line 23
SourceType-Conference Papers & Proceedings-2
ISBN:1467329061
9781467329064
DOI:10.1109/ICCCI.2013.6466125