Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
by Jim Parker
Thursday, October 23, 2008, 9:00am - Thursday, October 23, 2008, 11:00am
Our research has focused on being the "eyes and ears" for trust evaluation. We have developed an extensive simulation to investigate the viability of detecting malicious and faulty node behavior in MANETs. We first show detection capability at the network layer and introduce two techniques for reacting to malicious behavior. We then demonstrate detection using information from multiple layers of the OSI stack. Finally, we tie everything together by combining the detection techniques with a field communications scenario.