Enforcing data integrity in very large ad hoc networks

Daniela Gavidia*, Maarten van Steen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)


Ad hoc networks rely on nodes forwarding each other's packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belong to the same organization and share the same goal (in military scenarios, for example), it can generally be expected that all nodes can be trusted. However, as wireless technology becomes more commonplace, we can foresee the appearance of very large, heterogeneous networks where the intentions of neighboring nodes are unknown. Without any security measures in place, any node is capable of compromising the integrity of the data it forwards. Our goal in this paper is to ensure the integrity of the data being disseminated without resorting to complex and expensive solutions. We achive this by discouraging malicious behavior in two ways: a) enforcing integrity checks close to the source and b) refusing to communicate with obviously malicious nodes. We find that by having nodes sample their traffic for corrupted messages, malicious nodes can be identified with high accuracy, in effect transforming our collection of nodes into a self-policing network.

Original languageEnglish
Title of host publication8th International Conference on Mobile Data Management, MDM 2007
Subtitle of host publicationMay 7-11, 2007, Mannheim, Germany ; proceedings
Place of PublicationPiscataway, NJ
Number of pages9
ISBN (Print)1-4244-1241-2, 9781424412402
Publication statusPublished - 1 Dec 2007
Externally publishedYes
Event8th International Conference on Mobile Data Management, MDM 2007 - Mannheim, Germany
Duration: 7 May 200711 May 2007
Conference number: 8

Publication series

NameInternational Conference on Mobile Data Management
ISSN (Print)1551-6245
ISSN (Electronic)2375-0324


Conference8th International Conference on Mobile Data Management, MDM 2007
Abbreviated titleMDM 2007


Dive into the research topics of 'Enforcing data integrity in very large ad hoc networks'. Together they form a unique fingerprint.

Cite this