Policy-based Malicious Peer Detection in Ad Hoc Networks

dc.contributor.authorLi, Wenjia
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-11-19T19:25:13Z
dc.date.available2018-11-19T19:25:13Z
dc.date.issued2009-08-29
dc.descriptionProceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009)en
dc.description.abstractMobile Ad hoc Networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and develop a policy-based malicious peer detection mechanism, in which context information, such as communication channel status, buffer status, and transmission power level, is collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the policy-based malicious peeren
dc.description.urihttps://ieeexplore.ieee.org/document/5283307en
dc.format.extent7 pagesen
dc.genreconference papers and proceedings preprintsen
dc.identifierdoi:10.13016/M2VD6P84M
dc.identifier.citationWenjia Li, Anupam Joshi, and Tim Finin , Policy-based Malicious Peer Detection in Ad Hoc Networks, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), DOI: 10.1109/CSE.2009.289en
dc.identifier.uri10.1109/CSE.2009.289
dc.identifier.urihttp://hdl.handle.net/11603/12058
dc.language.isoenen
dc.publisherIEEEen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2009 IEEE
dc.subjectAd hoc networksen
dc.subjectNetwork topologyen
dc.subjectWorking environment noiseen
dc.subjectComputer networksen
dc.subjectCommunication channelsen
dc.subjectbuffer statusen
dc.subjectFault detectionen
dc.subjectmisbehavior detectionen
dc.subjectUMBC Ebiquity Research Groupen
dc.titlePolicy-based Malicious Peer Detection in Ad Hoc Networksen
dc.typeTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
458.pd.pdf
Size:
376.64 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: