Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Detecting Malicious Entities in Wireless Mesh Networks

Author : K Vijay Kumar 1 B Rasagna 2 Prasad B 3

Date of Publication :7th March 2016

Abstract: Multi-hop wireless mesh networks provide a community with a communication infrastructure which gives the ability to have a single or few connections to the internet along with each other. The core philosophy is that each node in the network would route each other packets for the benefit of everyone in the mesh network. This can give rise to a malicious node taking advantage of the forwarding nature in the network. A malicious node can drop the packets that should be forwarded and only forward its own packets therefore decreasing the benefits of the network for nodes upstream from the "bad" node. We present a Random Tester Detection Protocol (RTDP) that will detect the malicious node. The protocol leverages the broadcast nature of wireless networks along with anonymous messages to detect the free riding nodes. The protocol is evaluated in a network simulator created using Java.

Reference :

    1. M. L. Sichitiu. Wireless Mesh Networks: Opportunities and Challenges. http://www4.ncsu.edu/~mlsichit/Research/Publications/wwc Challenges.pdf
    2. R. Mahajan, M. Rodrig, D. Wetherall, J. Zahorian. Sustaining Cooperation in Multi Hop Wireless Network. Network Systems Design and Implementation (NSDI) 2005
    3. Q. Sun and H. Garcia-Molina. A selfish link-based incentive mechanism for unstructured peer-to-peer networks. In 24th International Conference on Distributed Computing Systems, Mar. 2004
    4. M. Pritchard. How to hurt the hackers: The scoop on Internet cheating and how you can combat it. http://www.gamasutra.com/features/20000724/pritchard pfv.htm, July 2000
    5. L. Butty, J.P. Hubaux. Security and Cooperation in Wireless Networks. Thwarting malicious and selfish behavior in the age of ubiquitous computing. A graduate textbook, Draft Version 1.0 August 2, 2006
    6. S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the Internet. EEEE/ACM Transactions on Networking, Aug. 1999
    7. K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson. Detecting disruptive routers: a distributed network monitoring approach. Network, EEEE. Volume 12, Issue 5, Sept.-Oct. 1998 Page(s):50 – 60
    8. J. Case, M. Fedor, M. Scho_stall, and J. Davin. A Simple Network Management Protocol (SNMP)", May 1990. RFC 1157
    9. S. Buchegger, J.Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes I Fairness In Dynamic Ad-hoc Networks. 1C Technical Report IC/2002/01
    10. Y. Zhang, W Lee. Intrusion detection in wireless adhoc networks. In Proceedings of MOBICOM 2000, pages 275-283, 2000
    11. P. Michiardi and R. Molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia., 2002
    12. B. Raghavan, A. C. Snoeren. Priority Forwarding in Ad Hoc Networks with Self-interested Parties. University of California, San Diego

Recent Article