Open Access Open Access  Restricted Access Subscription or Fee Access

A Collusion-Resistant Acknowledgement-based Scheme for Mitigation of Packet Drop in MANETs

G.D. Anjaly, J.C. Kavitha


MANETs are based on wireless multi-hop communication. To ensure correct operation, nodes need to cooperate and forward messages from other nodes. However there can be misbehaving nodes that can silently drop packets. Such misbehaviors can be either an individual node misbehavior or misbehavior of nodes in collusion. In this paper, a new approach is proposed to identify and mitigate the packet dropping due to individual node misbehavior and collusion. This collusion-resistant acknowledgement-based scheme, called CRACK is introduced based on DSR protocol. Simulation results are presented to estimate the performance of the proposed scheme and compare it with the other methods.


Collusion-Resistant, RSA, Acknowledgement-Based Systems.

Full Text:



K. Balakrishnan, J. Deng, and P. K. Varshney. Twoack: Preventing selfishness in mobile ad hoc networks. In WCNC 2005, pages 2137-2142, 2005.

S. Buchegger and J. Y. L. Boudec. Performance analysis of the CONFIDANT protocol: cooperation of nodes: Fairness in dynamic adhoc networks. In MobiHOC 2002,pages 226-236 June 2002.

L. Buttyan and J.P. Hubaux. Stimulating cooperation in self-organizing mobile ad-hoc networks. ACM/ Kluwer Mobile Networks and Applications , 8(5), pages 579-592, 2003.

CP. Chang, JC. Lin and F. Lai. Trust-group-based authentication services for mobile ad hoc networks. In International Symposium on Wireless Pervasive Computing (ISWPC), 06, pages 37–40, January 2006.

T. Chen, O. Mehani and R. Boreli. Trusted routing for VANET. In International Conference on Intelligent Transport Systems Telecommunications (ITST), 09, pages 647-652, October 2009.

D. B. Johnson, D. A. Maltz, Y. C. Hu and J. G. Jetcheva. The dynamic source routing protocol for mobile ad hoc networks (DSR), Internet-Draft, February 2002.

S. Marti, TJ. Giuli, K. Lai, M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), pages 255–265,August 2000.

H. M. Sun, C. C, H, Chen and Y. F. Ku. A novel acknowledgment-based approach against collude attacks in MANET. In Expert Systems with Applications, 39, pages 7968–7975, July 2012.

S. Zhong, J. Chen, and Y. R. Yang. Sprite: A simple cheat-proof, creditbased system for mobile ad-hoc networks. In INFOCOM March 2003, pages 1987–1997, 2003.

The Network Simulator (ns-2), URL:

Anderegg, L., & Eidenbenz, S. (2003). Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. ACM MobiCom(September), 245–259.

Wang, W., & Li, X. Y. (2006). Low-cost routing in selfish and rational wireless ad hoc networks. IEEE Transactions on Mobile Computing, 5(5), 596–607.

Eidenbenz, S., Resta, G., & Santi, P. (2008). The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes. IEEE Transactionson Mobile Computing, 7(1), 19–33.

Liu, K., Deng, J., Varshney, P. K., & Balakrishnan (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANET. IEEE Transactions on Mobile Computing, 6(5), 488–502.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.