Open Access Open Access  Restricted Access Subscription or Fee Access

A System of Umpires for Security of MANET

Ayyaswamy Kathirvel, Rengaramanujam Srinivasan

Abstract


A mobile ad hoc network (MANET) is a self-created self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or centralized administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of MANET. In this paper we propose an umpiring system (US) that provides security for routing and data forwarding operations. We present three US models - Single Umpiring System (SUS), Double Umpiring System (DUS), and Triple Umpiring System (TUS). In the umpiring system, each participating node of the system will have different roles to play; some of the nodes will be doing traditional operations of routing and packet forwarding, while some others will be monitoring the behavior of designated nodes. If any misbehavior is noticed umpires immediately flag off the guildy node. US do not apply any cryptographic techniques on the routing and packet forwarding messages. We have demonstrated the umpiring system by implementing it on popular AODV protocol. Extensive simulation studies using QualNet 4.5 establish the soundness of the proposal.

Keywords


MANET, SUS, DUS, TUS and Malicious Nodes

Full Text:

PDF

References


Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, in proc. ACM MobiCom, 2000, pp- 255-265.

Hao Yang, James Shu, Xiaoqiao Meng and Songwu Lu, “SCAN: Self-Organized Network-Layer Security in Mobile ad hoc networks”, IEEE Journals on selected areas in communications, vol. 24, No. 2, February 2006.

L. Bajaj, M. Takai, R. Ahuja, R. Bagrodia, and M. Gerla, “Glomosim : A scalable network simulation environment. Technical Report 990027, 1999.

Scalable Networks Technologies: QualNet simulator version 4.5. http://www.scalable-networks.com

IEEE 802.11. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, August, 1999.

A.Kathirvel and R.Srinivasan, “Performance Enhancement on demand routing protocol in mobile ad hoc networks”, in Proc. Second National Conference, PSG tech, 2006.

Marianne A. Azer, Sherif M. El-Kassas, and Magdy S. El-Soudani, “Certification and revocation schemes in ad hoc networks survey and challenges, in proc. IEEE ICSNC 2007.

J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET”, in Proc. IEEE ICNP, 2001, pp. 251-260.

Lei Feng-Yu, Cui Guo-Hua, and Liao Xiao-Ding, “Ad hoc Networks security mechanism based on CPK”, in proc. IEEE ICCISW, 2007, pp. 522 – 525.

Pi Jian Yong, Liu Xin Song, Wu Ai, Liu Dan, “A Novel Cryptography for Ad Hoc Network Security”, in Proc. IEEE 2006, pp. 1448 -1451.

Michael Hauspie, and Isabelle Simplot-Ryl, “Enhancing nodes cooperation in ad hoc networks”, in proc. IEEE 2007, pp. 130 – 137.

S. Capkun, L. Buttyan and J. Hubaux, “Self-organized public-key management for mobile ad hoc networks”, IEEE Trans. Mobile Computing, vol. 2, No. 1, pp. 52-64, January, 2003.

Pi Jian Yong, Liu Xin Song, Wu Ai, Liu Dan, “A Novel Cryptography for Ad Hoc Network Security”, in Proc. IEEE 2006, pp. 1448 -1451.

J. Hubaux, L. Buttyan, and S. Capkun, “The quest for security in Mobile ad hoc networks”, in Proc. ACM MobiHoc, 2001, pp. 146-155.

C. Sivaram murthy and B.S. Manoj, “ Ad hoc wireless networks architectures and protocols”, Pearson Education, First edition, 2007.

Jochen Schiller, “Mobile Communications”, Pearson Education, Second edition, 2007.

D. Johnson, D. Maltz, and J. Jetcheva, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Network, Ad Hoc Networking. Reading, MA: Addison-Wesley, 2001, ch. 5.

D.B. Johnson and D.A. Maltz, “Dynamic source routing in ad hoc wireless networks”, in Mobile Computing, volume 353, Kluwer Academic Publishers.

D.B. Johnson, D.A. Maltz, and Y.C. Hu, “ The dynamic source routing protocol for mobile ad hoc networks (dsr). Internet Draft, draft-ietf-manet-dsr-09.txt, April, 2003.

C. Perkins, and E. Royer, “Ad hoc on-demand distance vector routing”, in Proc. IEEE WMCSA, 1999, pp. 90-100.

C. Perkins, E. Royer and S. Das, “Ad hoc on demand distance vector (AODV) routing”, Internet Draft, draft-ietf-manet-aodv-10.txt, 2002.

S. Das, C. Perkins, and E. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks”, in Proc. IEE INFOCOM, 2003, pp. 3-12.

Wenjing Lou and Yuguang Fang, “Predictive caching strategy for on-demand routing protocols in wireless ad hoc networks”, Wireless networks 8, pp. 671-679, 2002.

Ashwini K. Pandey and Hiroshi Fujinoki, “Study of MANET routing protocols by Glomosim simulator”, International Journal of Network Management, pp. 393 – 410.

Kui Wu, and JanelleHarms, “Performance study of proactive flow handoff for mobile ad hoc networks”, Proc in Int Conf. pp.1-15.

Zhi Ren and Jing Su, “ A cross-layer aodv routing protocol”, Proc. of IEEE ICMA, 2005. Pp 2150 -2155.

Ljubica Blazevic, Jean-Yvas Boudec and Silvia Giordano, “ A location based routing method for mobile ad hoc networks”, IEEE transactions on Mobile computing, vol 4 no 2 march/april 2005.

Alvin C Valera, Winston K G Seah and S V Rao, “Improving protocol robustness in ad hoc networks through cooperative packet caching and shortest multipath routing”, IEEE transcations on Mobile computing, vol 4 no 5, septemper/october 2005.

J Broch, D Maltz, D Johnson, Y C Hu and J Jetcheva, “A performance comparison of multihop wireless ad hoc network routing protocols”, Proc. ACM/IEEE Mobicom Conf. pp. 85- 97, 1998.

S J Lee, C.K Toh and M Gerla, “ Performance evaluation of table-driven and on-demand ad hoc routing protocols”, proc. IEEE symp. Personal, Indoor and Mobile Radio Comm., pp. 297-301, 1999.

S Das, R Castaneda, J T Yan and R Sengupta, “ Comparative performance evaluation of routing protocols for mobile ad hoc networks”, proc. IEEE Int’l Conf. Computer Comm and Networks, 1998.

Asad Amir Pirzada, Chris Mc Donald, and Amitava Datta, “Performance comparison of trust based reactive routing protocols”, IEEE transactions on Mobile computing, vol 5 no 6, June 2006.

Rendong Bai and Mukesh Singhal, “ DOA: DSR over AODV routing for mobile ad hoc networks”, IEEE transcations on Mobile computing, vol 5, no 10, october 2006.

Ayyaswamy Kathirvel and Rengaramanujam Srinivasan, “Performance Analysis of Propagation Model using Wireless Mobile Ad Hoc Network Routing Protocols”, CiiT International Journal of Wireless Communication, September 2009.

Ayyaswamy Kathirvel and Rengaramanujam Srinivasan, “A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes”, International Journal of Engineering and Technology, Vol. 1 No. 1, pp. 151- 155, April 2009.

Ayyaswamy Kathirvel and Rengaramanujam Srinivasan, “Enhanced Self Umpiring System for security using Salvaging Route Reply”, International Journal of Computer Theory and Engineering, (upcomming issue).

C. Perkins, and E. Royer, “Ad hoc on-demand distance vector routing”, in Proc. IEEE WMCSA, 1999, pp. 90-100.

C. Perkins, E. Royer and S. Das, “Ad hoc on demand distance vector (AODV) routing”, Internet Draft, draft-ietf-manet-aodv-10.txt, 2002.

S. Das, C. Perkins, and E. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks”, in Proc. IEE INFOCOM, 2003, pp. 3-12.

C. Sivaram murthy and B.S. Manoj, “ Ad hoc wireless networks architectures and protocols”, Pearson Education, First edition, 2007.

Jochen Schiller, “Mobile Communications”, Pearson Education, Second edition, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.