Open Access Open Access  Restricted Access Subscription or Fee Access

Providing a 1ACK Scheme for Detecting Mischief Nodes in MANET

J.R. Meghana, S. Manasa, M.S. Muneshwara, G.N. Anil

Abstract


Routing is the process of selecting a path for the transfer of desired information in the form of packets from the source to the ultimate destination in a network. Generally, routing protocols for Mobile Ad hoc Networks are developed assuming that all nodes that participate in routing are harmonious. However, node misbehaviour may be present due to barely available battery-based energy, increased consumption of local CPU time, memory and network bandwidth. Therefore, some of the nodes tend to be selfish by participating in the route discovery but refuse to forward the packets. In the following sections we propose an ACK based scheme to detect misbehaviour nodes in MANETs and to mitigate their ill effects. The main concept of the ACK scheme is that, the node that has sent the packets must receive an acknowledgement from the next hop in the path to destination. In order to minimize additional routing overhead, only a part of the received data packets are acknowledged in the ACK scheme. Thus, we conclude that the proposed method can be used for detection of misbehaving nodes in ad hoc wireless networks.

Keywords


Acknowledgement, Mobile Ad hoc Networks (MANETs); Node Misbehaviour; Network Security;

Full Text:

PDF

References


J . Broch D. A .Maltz , D. B. Johnson , Y.C. Hu, and J.Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols In Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98), October 1998.

S. Corson and V. Park. Temporally-Ordered Routing Algorithm (TORA)Version 1 Functional Specification. Mobile Ad-hoc Network (MANET} Working Group, IETF, October 1999.

S. Dos, C. E. Perkins and E. M. Royer. Ad Ho c On Demand Distance Vector (AODV) Routing (Internet-Draft). Mobile Ad- hoc Network MANET) Working Group, IETF, October 1999.

P. Johansson and T. Larsson. Scenario-Based Performance Analysis of Routing Protocols for Mobile Ad–Hoc Networks. In Proceedings of the Fifth Annual A CM/1EEE International Conference on Mobile Computing and Networking (MOBICOM 99), August 1999.

D. Johnson, D. A. Maltz, and 3. Broch. The Dynamic Source Routing Protocol for Mobile Ad Hoe Networks (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.

F. Stajano and R. Anderson. The Resurrecting Duckling Security Issues for Ad-hoc Wireless Networks. B. Christianson, B. Crispo, and M. Roe (Eds.)., Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.

Y.-B. Ko and N. H. Vaidya. Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms. WMCSA '99, New Orleans.

Y.-B. Ko and N. H. Vaidya. Location-Aided Routing (LAR) in Mobile Ad Hoc Networks. In Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and

Networking (MOBICOM '98), October 1998.

Charles E. Perkins,editor. Ad Hoc Networking. Addison- Wesley, 2001.

Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure On Demand Routing Protocol for Ad hoc Networks. In Proceedings of MobiCom 2002, Atlanta, Georgia, USA, September 2002.

Panagiotis Papadimitratos and Zygmunt J. Haas. Secure Routing for Mobile Ad hoc Networks. In SCS Communication Networks and Distributed Systems Modelling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002

Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), November 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.