CFP last date
20 December 2024
Reseach Article

I-2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks

by Aishwarya S. Anand Ukey, Meenu Chawla, Virendra Pal Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 12
Year of Publication: 2013
Authors: Aishwarya S. Anand Ukey, Meenu Chawla, Virendra Pal Singh
10.5120/10134-4924

Aishwarya S. Anand Ukey, Meenu Chawla, Virendra Pal Singh . I-2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks. International Journal of Computer Applications. 62, 12 ( January 2013), 34-39. DOI=10.5120/10134-4924

@article{ 10.5120/10134-4924,
author = { Aishwarya S. Anand Ukey, Meenu Chawla, Virendra Pal Singh },
title = { I-2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 12 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number12/10134-4924/ },
doi = { 10.5120/10134-4924 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:38.069751+05:30
%A Aishwarya S. Anand Ukey
%A Meenu Chawla
%A Virendra Pal Singh
%T I-2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 12
%P 34-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc NETwork (MANET) is considered as network without infrastructure where communication between the mobile nodes solely depends on the routing protocols which work on assumption that nodes are fully cooperative. In the presence of misbehaving nodes, most of the routing protocols show dropped performance and in some case whole of the network fails. Misbehaving nodes interrupt the data flow by either by dropping or refusing to forward the data packets thus forcing routing protocol to restart the route-discovery or to select an alternative route if available which may again include some misbehaving nodes, thereby forming a loop, enforcing source node to conclude that data cannot be further transferred. In this paper, a new reputation based approach is proposed which deals with such misbehaving nodes and can be integrated on top of any source routing protocol Proposed approach consists of detection and isolation of misbehaving nodes and based on sending acknowledgement packets back for reception of data packets.

References
  1. C. Mbarushimana, and A. Shahrabi, "Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks," in Proc. of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW '07), May 2007, pp. 679–684.
  2. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber, "Securing Adhoc Routing Protocols," in Proc. of the 30th EUROMICRO Conference (EUROMICRO'04), August 2004, pp. 514–519.
  3. Abdelaziz Babakhouya, Yacine Challal, and Abdelmadjid Bouabdallah, "A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks," in Proc. of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, September 2008, pp. 592-597.
  4. Mohammad Al-Shurman, Seong-Moo Yoo, and Seungjin Park, "Black hole attack in mobile Ad Hoc networks," in Proc. of the 42nd annual Southeast regional conference, ACM Southeast Regional Conference, April 2004, pp. 96–97.
  5. J. Sen, M. G. Chandra, S. G. Harihara, H. Reddy, and P. Balamuralidhar, "A mechanism for detection of gray hole attack in mobile Ad Hoc networks," in Proc. of the 6th International Conference on Information, Communications & Signal Processing, December 2007, pp. 1-5.
  6. S. Zhong, J. Chen, and Y. Yang, "Sprite: A Simple, Cheat Proof, Credit- Based System for Mobile Ad-Hoc Networks," in Proc. of IEEE INFOCOM'03, March 2003, pp. 1987-1997.
  7. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proc. of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), August 2000, pp. 255-265.
  8. Sonja Buchegger Jean-Yves Le Boudec, "Performance Analysis of the CONFIDANT Protocol Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks" in Proc. IEEE/ACM Workshop Mobile Ad Hoc Netw. Comput. (MobiHoc 2002), June 2002, pp. 226-236.
  9. K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK: Preventing Selfishness in Mobile Ad hoc Networks," in Proc. of Wireless Communications and Networking Conference (WCNC'05), vol. 4, March 2005, pp. 2137-2142.
  10. K. Vijaya "Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks," TENCON 2008, IEEE Region 10 Conference, November 2008, pp. 1-7.
  11. S. Usha, S. Radha, "Co-operative Approach to Detect Misbehaving Nodes in MANET Using Multi-hop Acknowledgement Scheme," in 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, December 2009, pp. 576-578.
  12. Muhammad Zeshan, Shoab A. Khan, Ahmad Raza Cheema, and Attique Ahmed, "Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks," in 2008 International Seminar on Future Information Technology and Management Engineering, November 2008, pp. 568-572.
  13. D. B. Johnson, D. A. Maltz, and Y. Hu, "The Dynamic Source Routing Protocol for Mobile ad-hoc Networks (DSR)," IETF Internet Draft, July 2004.
  14. "The Network Simulator - ns-2," isi. edu, [Online] Available: http://www. isi. edu/nsnam/ns/ [Accessed: Jan, 2013].
Index Terms

Computer Science
Information Sciences

Keywords

Routing Misbehavior Non-cooperation Misbehaving Nodes Malicious Acknowledgement packet transmission