A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks

@article{Ayday2010APF,
  title={A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks},
  author={Erman Ayday and Faramarz Fekri},
  journal={Ad Hoc Networks},
  year={2010},
  volume={8},
  pages={181-192}
}
In Mobile Ad-Hoc Networks (MANETs), establishing trust relationships between the nodes in a decentralized fashion has been an important research issue for a long time. If the sender nodes accurately identify the legitimate nodes in the network, a robust routing can be provided while mitigating the effects of malicious nodes. Further, there is always a mutual interaction between a sender and its neighbor nodes during the communication. This mutual interaction can be easily modeled as a game… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

Intrusion detection in MANET using Self Organizing Map (SOM)

2014 International Conference on Recent Trends in Information Technology • 2014
View 1 Excerpt

Security enhancement by detection and penalization of malicious nodes in wireless networks

2014 International Conference on Signal Processing and Integrated Networks (SPIN) • 2014
View 1 Excerpt

Trust management and adversary detection for delay tolerant networks

2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE • 2010
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 25 references

On using reputations in ad hoc networks to counter malicious nodes

Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004. • 2004
View 2 Excerpts

Raptor codes

International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings. • 2004
View 2 Excerpts

Similar Papers

Loading similar papers…