Download now Free registration required
Much research in ad hoc networks utilizes monitoring mechanisms to detect maliciously acting nodes. The faults that a system is exposed to range from simple omissions to packet manipulations and misrouting. Several monitoring techniques have been presented that address malicious behavior in specific environments, but each has their restrictive assumptions about detection and mitigation in hostile environments. The authors generalize the notion of malicious behavior of related research and outline a k-hop monitoring approach that allows one to drop many assumptions limiting previous work.
- Format: PDF
- Size: 185.8 KB