2003
DOI: 10.1007/978-3-540-39611-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks

Abstract: Abstract. Most of the routing protocols in wireless ad

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 54 publications
(46 citation statements)
references
References 16 publications
0
46
0
Order By: Relevance
“…Numerous solutions have been proposed for providing a secure and reliable certification authority in ad hoc networks [14], [15], [16], [17]. Another problem that has received attention is that of stimulating cooperation among nodes in an ad hoc network and addressing malicious packet dropping [18], [19], [20], [21], [22], [23]. Strategies used include detecting and punishing non-cooperating nodes, rewarding nodes for forwarding packets, concealing the true destination of packets from intermediate nodes, and using redundant data transmissions over multiple paths.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous solutions have been proposed for providing a secure and reliable certification authority in ad hoc networks [14], [15], [16], [17]. Another problem that has received attention is that of stimulating cooperation among nodes in an ad hoc network and addressing malicious packet dropping [18], [19], [20], [21], [22], [23]. Strategies used include detecting and punishing non-cooperating nodes, rewarding nodes for forwarding packets, concealing the true destination of packets from intermediate nodes, and using redundant data transmissions over multiple paths.…”
Section: Introductionmentioning
confidence: 99%
“…Acknowledgement based approaches like [10] and [11] require sending of acknowledgements either by an intermediate node or the destination node to it's upstream neighbours as a proof of packet reception. Probing based approaches like [12] and [13] probe the source to destination path for the identification of packet droppers which involves sending traffic onto a network to sample it's behaviour. The traffic can be in the form of simple probe packets or complex test transactions which is used to obtain metrics pertaining to end-to-end communication points such as latency, loss, and route availability.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques for monitoring neighbor communication and behavior in wireless channel have been proposed to detect and minimize misbehaving nodes [10,32,33]. Generally, these techniques assume that wireless interfaces support promiscuous mode operation.…”
Section: Survivability Key Propertiesmentioning
confidence: 99%