Open Access Open Access  Restricted Access Subscription or Fee Access

Risk-Aware Approach for Handling Routing Attacks And Selfishness using RBNC in MANET

P. Hemavathy, Kanmani Govindaraj, Karthika Kothandam

Abstract


In MANET dynamic topology affects the transmission in network.  Broadcasting plays a main role in packet transmission. In this, if nodes in the network keep the resource selfishly and not participate in transmission, it may be malicious. This affects the overall performance in network. Using re-broadcasting protocol RBNC (Rebroadcasting Neighbour Coverage protocol), we can reduce the high channel contention causing redundancy and we can find the trusted forwarding nodes in routing by retransmission mechanism. Routing search can be reduced using delay tolerant of intermediate node (i.e. no.of RREQ from forwarding nodes during route discovery). Thus our re-broadcasting protocol reduces the risk in routing and node selection in transmission, which is simulated in NS2 and the performance is evaluated under error model and broadcasting methodology.


Keywords


Rebroadcasting Neighbour Coverage Protocol; Selfish Nodes; False Alarm; Degree of Selfishness; Credit Risk; DTN; Risk-Aware Decision Making; Mobile Ad Hoc Network

Full Text:

PDF

References


C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector Routing”, Mobile Ad-Hoc Network Working Group, vol.3561, 2003.

T. Clausen and P. Jacquet, “Opimized Link State Routing Protocol”, Network Working Groupo, 2003.

Sagar D. Padiya, Rakesh Pandit, Sachin Patel “A System for MANET to Detect Selfish Nodes Using NS2” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue2, November 2012, ISSN: 2319-5967 ISO 9001:2008 Certified.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipur, “ A Survey of Routing Attacks in Mobile Ad Hoc Networks”, IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp.85-91, Oct 2007.

“Fast Route Recovery Scheme for Mobile Ad Hoc Networks”,Junghwi Jeon, Kiseok Lee and Cheeha Kim, Information Networking(ICOIN), 2011 International Conference 978-1-61284-661-3.

Jim Solomon Raja.D1, Immanuel John Raja.J, ” A Survey on Selfishness Handling In Mobile Ad Hoc Network” International Journal of Emerging Technology and Advanced Engineering Website:www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 11, November 2012).

K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK:Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking, pp. 2137-2142, 2005.

Abhishek Gupta , Amit Saxena “ Detection and Prevention of Selfish Node in MANET using Innovative Brain Mapping Function: Theoretical Model” International Journal of Computer Applications (0975 – 8887) Volume 57– No.12, November 2011.

“A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security/Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. – - – 2006 Springer.

S. Marti, t. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, Proc. ACM MobiCom, pp. 255-265, 2000.

S.Bhuvaneshwari1, Prof.M.Suguna “Identifying and handling of false alarm in selfish replica allocation”, International Journal of Computer Science and Management Research Vol 2 Issue 4 April 2013 ISSN 2278-733X.

Y. Sasson, D. Cavin, A. Schiper. Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks. IEEE Wireless Communications and Networking Conference (WCNC) - March 2003.

Sung-Ju Lee, W. Su, M. Gerla. On-Demand Multicast Routing Protocol (ODMRP) for Ad Hoc Networks. Internet Draft (work in progress), June 1999.

C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath. Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. DIAL M'99, August 1999.

Nahata, P. Pamu, S. Garg, and A. Helmy. Efficient resource discovery for large scale ad hoc networks using contacts. ACM SIGCOMM Computer Communications Review, 32(3):32, July 2002.

Adam Chlipala, Jonathan Hui and Gilman Tolle, Deluge: Data Dissemination in Multi-Hop Sensor Networks," UC Berkeley CS294-1 Project Report, December 2003.

Ns2 Reference from http://networksimulation.wordpress.com/


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.