Download Now Free registration required
Wireless ad-hoc network particularly mobile ad-hoc networks are highly vulnerable to intrusion, node compromise and physical capture attacks can easily destroy the network, since they are not protected by any high resistant hardware due to their low-cost and small size. If they are captured the devices can be easily compromised and cloned. The cloned devices will have the same identity as legitimate devices and interact with other devices in the network. This paper depicts a model to evaluate the node's reputation, and also avoids the malicious node in the forwarding path. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signaling at the MAC layer.
- Format: PDF
- Size: 326.7 KB