2012
DOI: 10.7763/ijiee.2012.v2.114
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid System for Detecting Misbehaving Nodes in Ad Hoc Networks

Abstract: Abstract-In this paper we express a new intrusion detection system based on counters and a cache memory to detect malicious nodes and selfish nodes in ad hoc network. Network survivability, networks performance and network security are important issues in mentioned networks. The presented work enhances the mentioned factors because it doesn't need heavy computation and also its speed and accuracy in detecting suspicious nodes are great. We simulated our methods by NS2 software. The simulation results show that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…This protocol is named based on table or table driven. In this routing protocol, the previous routing information is in routing table of each node and, if topology changes, this information will be transmitted to all network nodes, and routing tables will be updated and origin node identifies route of the destination node with information of routing tables of each node and uses them [7,8].…”
Section: A-proactive Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…This protocol is named based on table or table driven. In this routing protocol, the previous routing information is in routing table of each node and, if topology changes, this information will be transmitted to all network nodes, and routing tables will be updated and origin node identifies route of the destination node with information of routing tables of each node and uses them [7,8].…”
Section: A-proactive Protocolmentioning
confidence: 99%
“…In AODV routing algorithm, origin node produces a RREQ packet and specifies source and destination nodes and then releases this RREQ packet for self adjacent nodes. If each node has a route to the destination node in its memory, it produces RREP Packet; otherwise, it releases RREQ packet for its adjacent nodes [7,8,13,14].…”
Section: B-reactive Protocolmentioning
confidence: 99%
See 3 more Smart Citations