CFP last date
20 January 2025
Reseach Article

A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

by Shirina Samreen, G. Narasimha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 10
Year of Publication: 2013
Authors: Shirina Samreen, G. Narasimha
10.5120/10962-5933

Shirina Samreen, G. Narasimha . A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET. International Journal of Computer Applications. 65, 10 ( March 2013), 29-35. DOI=10.5120/10962-5933

@article{ 10.5120/10962-5933,
author = { Shirina Samreen, G. Narasimha },
title = { A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 10 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number10/10962-5933/ },
doi = { 10.5120/10962-5933 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:30.415015+05:30
%A Shirina Samreen
%A G. Narasimha
%T A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 10
%P 29-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is based upon multi-hop communication wherein the nodes themselves act as routers as well as source. The inherent characteristics of a MANET make it vulnerable to a variety of insider as well as outsider attacks. Most of the secure routing protocols do not focus on the insider attacks wherein certain adversarial nodes may launch a number of attacks on the routing protocol as well as on the data transmission by simply dropping the packets without forwarding them. We propose a secure hybrid routing protocol which combats the packet dropping attack carried on by an individual / colluding adversaries. It forms routes based upon a metric assigned to each node called weight / cost which indicates it's good / bad behaviour. A least cost route has to be formed by including those nodes with least weight representing good packet forwarding behaviour. The protocol monitors the ongoing data transmission in the form of acknowledgements from destination, detects the adversarial nodes on the path through a mechanism based upon bloom filters used as node behavioural proofs , adjusts the weight of the adversarial nodes and propagates the information so that the proactive routing tables involving the adversarial node update their appropriate routing table entries. The result of these activities is the establishment of a route including those nodes with good packet forwarding behaviour.

References
  1. Haas Z. J. , Pearlman M. R. , and Samar P. , "The Zone Routing Protocol (ZRP)", IETF Internet Draft, draft-ietf-manet-zone-zrp-04. txt, July 2002.
  2. Jan Schaumann, "Analysis of Zone Routing Protocol", Course CS765, Stevens Institute of Technology Hoboken, New Jersey, USA, 8th December 2002
  3. Sanzgiri, Dahill, Levine, Shields and Belding-Royer, "A secure routing protocol for ad hoc networks," In Proceedings of IEEE International Conference on Network Protocols (ICNP). 2002.
  4. Hu, Y. , Johnson, and Perrig, "SEAD: Secure Efficient Distance Vector Routing For Mobile Wireless Ad Hoc Networks," In Proceedings Of IEEE Workshop On Mobile Computing Systems And Applications (WMCSA). 2002
  5. Hu Y. , Perrig, and Johnson, "Ariadne: A Secure On-Demand Routing Protocol For Ad Hoc Networks," In Proceedings Of ACM Annual International Conference Of Mobile Computing (MOBICOM).
  6. Perkins, C. E. And Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) For Mobile Computers," In Proceedings Of SIGCOMM Conference On Applications, Technologies, Architectures, And Protocols For Computer Communication (SIGCOMM). 1994
  7. Johnson, Maltz, And Broch, "DSR: The Dynamic Source Routing Protocol For Multi-Hop Wireless Ad Hoc Networks. " In Ad Hoc Networking. Addison-Wesley, Chapter 5, 139–172.
  8. Perrig, Canetti, Song, And Tygar, "Efficient And Secure Source Authentication For Multicast," In Proceedings Of ISOC Symposium Of Network And Distributed Systems Security (NDSS).
  9. L. Buttyán, and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Net works and Applications, 8(5), pp. 579-592, 2003.
  10. M. Jakobsson, J. -P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Financial Crypto, 2003.
  11. S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks," in IEEE INFOCOM, pp. 1987-1997, 2003.
  12. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM), pp. 255-265, 2000.
  13. S. Buchegger and J. -Y. L. Boudec, "Self-policing mobile ad-hoc networks by reputation systems," IEEE communications Magazine, pp. 101-107, 2005.
  14. P. Michiardi, and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of IFIP Joint Working Conference on Communications and Multimedia Security, pp. 107-121, 2002.
  15. K. Liu, J. Deng, P. Varshney, K. Balakrishnan, "An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, 6(5), pp. 536550, 2007.
  16. V. Padmanabhan, D. Simon, "Secure traceroute to detect faulty or malicious routing," ACM SIGCOMM Computer Communication Review, 33(1), pp. 77-82, 2003.
  17. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks," ACM Trans. Inf. Syst. Secur. 10(4), 1-35, 2008.
  18. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "Intrazone Routing Protocol (IARP)", IETF Internet Draft, draft-ietf-manet-iarp-01. txt, June 2001
  19. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "Interzone Routing Protocol (IERP)", IETF Internet Draft, draft-ietf-manet-ierp-01. txt, June 2001.
  20. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "The Bordercast Resolution Protocol (BRP) for Ad Hoc Networks", IETF Internet Draft, draft-ietf-manet-brp01. txt, June 2001
  21. W. Kozma, and L. Lazos, "REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits," in Proceedings of the Second ACM Conference on Wireless Network Security (WiSec), pp. 103-110, 2009.
  22. Shirina Samreen and Dr. G. Narasimha, "Detection of Colluding Adversaries in a Packet Drop Attack on MANET," International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9, November- 2012 ISSN:2278-0181
Index Terms

Computer Science
Information Sciences

Keywords

Colluding adversaries Packet Drop Attack Bloom filters Secure Hybrid Routing Protocol