Techniques to identify and eliminate malicious nodes in cooperative wireless networks
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various...
Saved in:
Published in | 2013 International Conference on Computer Communication and Informatics pp. 1 - 4 |
---|---|
Main Authors | , , |
Format | Conference Proceeding Journal Article |
Language | English |
Published |
IEEE
01.01.2013
|
Subjects | |
Online Access | Get full text |
ISBN | 1467329061 9781467329064 |
DOI | 10.1109/ICCCI.2013.6466125 |
Cover
Summary: | In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly on approaches that gave good results and which have to be improved. We provided our simulation result using NS2 with some routing protocols. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Conference-1 ObjectType-Feature-3 content type line 23 SourceType-Conference Papers & Proceedings-2 |
ISBN: | 1467329061 9781467329064 |
DOI: | 10.1109/ICCCI.2013.6466125 |