Authors
Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio
Publication date
2014/7/14
Conference
2014 IEEE 15th International Conference on Mobile Data Management
Volume
1
Pages
279-288
Publisher
IEEE
Description
In mobile ad hoc networks (MANETs), it is effective for mobile nodes to retrieve data items using top-k queries, in which data items are ordered according to a particular attribute score, and the query-issuing node acquires the data items with the k highest scores. However, accurate results may not be acquired in environments where malicious nodes are present. In top-k queries, it is important to neutralize attacks in which malicious nodes attempt to replace necessary data items with unnecessary ones (we call these, data replacement attacks). In this paper, we propose methods for top-k query processing and malicious node identification against data replacement attack in MANETs. In the top-k query processing method, in order to maintain accuracy of the query result, nodes reply with data items with the k highest scores, along multiple routes. Moreover, to enable detection of data replacement attacks, reply …
Total citations
2015201620172018201920202021135311
Scholar articles
T Tsuda, Y Komai, Y Sasaki, T Hara, S Nishio - 2014 IEEE 15th International Conference on Mobile …, 2014