Tytuł artykułu
Autorzy
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This paper proposes routing misbehavior detection in MANETs using 2ACK scheme. Routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehavior may exist. In the existing system, there is a possibility that when a sender chooses anintermediate link to send some message to a destination, the intermediate link may pose problems such as, the intermediate node may not forward the packets to destination, it may take very long time to send packets or it may modify the contents of the packet. In MANETs, as there is no retransmission of packets once it is sent, care must be taken not to loose packets. We have analyzed and evaluated a technique, termed 2ACK scheme to detect and mitigate the effect of such routing misbehavior in MANETs environment. It is based on a simple 2-hop acknowledgment packet that is sent back by the receiver of the next-hop link. 2ACK transmission takes place for only a fraction of data packets, but not for all. Such a selective acknowledgment is intended to reduce the additional routing overhead caused by the 2ACK scheme. Our contribution in this paper is that, we have embedded some security aspects with 2ACK to check confidentiality of the message by verifying the original hash code with the hash code generated at the destination. If 2ACK is not received within the wait time or the hash code of the message is changed then the node to next hop link of sender is declared as the misbehaving link. We simulated the routing misbehavior detection using 2ACK scheme to test the operation scheme in terms of performance parameters.
Słowa kluczowe
Rocznik
Tom
Strony
105--111
Opis fizyczny
Bibliogr. 11 poz., rys.
Twórcy
autor
autor
autor
- Department of Electronics and Communication, Engineering Wireless Information System Research Lab, REVA Institute of Technology and Management, Bangalore, Karnataka, India, agentsun2002@yahoo.com
Bibliografia
- [1] E. Lorenzini, “Cooperation”, in Proc. Sust. Coop. Multi-Hop Wirel. Netw., 2007 [Online]. Available:http://www.research.microsoft.com/enus/um/people/ratul/.../nsdi2005-catch.pdf
- [2] G. F. Mariasy, P. Georgiadis, D. Flitzanis, and K. Mandalas, “Cooperation enforcement schemes for MANETs: a survey: research articles”, in Wirel. Commun. Mobile Comput., vol. 6, iss. 3, pp. 319–332, 2006.
- [3] L. Tamilselvan and V. Sankaranarayanan, “Prevention of cooperative black hole attack in MANET”, J. Netw., vol. 3, no. 5, pp. 13–20, 2008.
- [4] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs”, IEEE Trans. Mob. Comput., vol. 6, no. 5, pp. 536–550, 2007.
- [5] S. Dhanalakshmi and, M. Rajaram, “A reliable and secure framework for detection and isolation of malicious nodes in MANET”, Int. J. Comp. Sci. Netw. Secur., vol. 8, no. 10, pp. 184–190, 2008.
- [6] D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, “A general cooperative intrusion detection architecture for MANETs”, in Proc. 3rd IEEE Int. Inform. Assur. Worksh., College Park, USA, 2005, pp. 57–70.
- [7] W. Kozma Jr. and L. Lazos, “Reactive identification of misbehaviour in ad hoc networks based on random audits”, 2008 [Online]. Available: http://www.ieeexplore.ieee.org/iel5/4557722/4557723/04557810.pdf
- [8] D. Djenouri, O. Mahmoudi, M. Bouamama, D. Llewellyn-Jones, and M. Merabti, “On securing MANET routing protocol against control packet dropping” [Online]. Available: http://www.cscjournals.org/Journals/IJCSS/Volume2/Issue1/IJCSS-24.pdf
- [9] S. R. Biradar, K. Sharma, S. K. Sarkar, and Puttamadappa C., “Signal strengths based stable route for wireless ad-hoc networks” in Proc. Int. Worksh. Conf. Stat. Phys. Appr. Multi-Discip. Probl., Guwahati, India, 2008 [Online]. Available: http://www.iitg.ac.in/statphys/files/abs cn 05.pdf
- [10] K.-W. Chin, J. Judge, A. Williams, and R. Kermode, “Implementation experience with MANET routing protocols”, ACM SIGCOMM Comp. Commun. Rev., vol. 32, no. 5, pp. 49–59, 2002.
- [11] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, “Coverage problems in wireless ad-hoc sensor networks” [Online]. Available: http://www.ece.rice.edu/_1/papers/Infocom coverage 01.pdf
- [12] K. Singh, A. Nedos, and S. Clarke, “Distributed computing and networking”, in Proc. 8th Int. Conf. ICDCN 2006, Guwahati, India, 2006, Berlin Heidelberg: Springer [Online]. Available: http://www.springerlink.com/index/82r23149410vr703.pdf
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0020-0024
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.