A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes

被引:1
|
作者
Dadhich, A. [1 ]
Sarje, Dr. A. K. [1 ]
Garg, K. [1 ]
机构
[1] Indian Inst Technol Roorkee, Roorkee, Uttar Pradesh, India
来源
2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2 | 2008年
关键词
MANET; misbehaving nodes; watchdog;
D O I
10.1109/COMSWA.2008.4554507
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In a MANET, nodes provide a cooperative multi-hop forwarding functionality, so no specialized devices are required for routing packets. In such self-organized networks, forwarding packets for other nodes is not in the direct interest of any node, because nodes have to spend battery life, CPU cycles, and use the available network bandwidth to forward packets. So a node may refuse to forward packets for others to save its resources, while itself using their resources and asking them to forward its own packets. This deviation from the correct behavior represents a potential threat against the availability of service, as well as the network performance. Many solutions have been recently proposed for the misbehavior nodes threat, but these suffer from many problems like false detection due to ambiguity and receiver collision, power controlled misbehavior and cooperative misbehavior. In this paper we propose a new approach that addresses above problems by providing a distributed cooperative system, in which every node participates in identifying the misbehaving node. Every node exchanges its monitored information both cooperative as well as non-cooperative. This information then helps the routing protocol to avoid misbehaving nodes. This approach also gives chance of node's reintroduction into the network, so in case of false detection also a node can re-enter into the network. We present a performance analysis of MANET with the proposed approach and compare it to normal MANET as well as MANET with misbehaving nodes and no solutions. C++ has been used to implement the proposed approach in the AODV routing protocol in a MANET and testing has been done by simulation on the OMNET++ network simulator.
引用
收藏
页码:728 / 735
页数:8
相关论文
共 50 条
  • [21] Noncoherent Detection of Misbehaving Relays in Decode-and-Forward Cooperative Networks
    Lo, Li-Chung
    Huang, Wan-Jen
    Chang, Ronald Y.
    Chung, Wei-Ho
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (09) : 1536 - 1539
  • [22] Detection And Removal Of Node Isolation Attack In OLSR Protocol Using Imaginary Nodes With Neighbour Response In MANET
    Gaikwad, Kimaya S.
    Waykar, Sanjay B.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [23] Cooperative games, phase transitions on graphs and distributed trust in MANET
    Baras, JS
    Jiang, T
    2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 93 - 98
  • [24] Detection of colluding misbehaving nodes in Mobile Ad hoc and Wireless Mesh Networks
    Graffi, Kalman
    Mogre, Parag S.
    Hollick, Matthias
    Steinmetz, Ralf
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5097 - 5101
  • [25] Detecting critical nodes for MANET Intrusion Detection Systems
    Karygiannis, A.
    Antonakakis, E.
    Apostolopoulos, A.
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 7 - +
  • [26] A Cooperative Routing for MANET Based on Distributed Trust and Energy Management
    Venkanna, U.
    Agarwal, Jeh Krishna
    Velusamy, R. Leela
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (03) : 961 - 979
  • [27] A Cooperative Routing for MANET Based on Distributed Trust and Energy Management
    U. Venkanna
    Jeh Krishna Agarwal
    R. Leela Velusamy
    Wireless Personal Communications, 2015, 81 : 961 - 979
  • [28] Cooperative information management for distributed production nodes
    Afsarmanesh, H
    Benabdelkader, A
    Hertzberger, LO
    GLOBALIZATION OF MANUFACTURING IN THE DIGITAL COMMUNICATIONS ERA OF THE 21ST CENTURY: INNOVATION, AGILITY, AND THE VIRTUAL ENTERPRISE, 1998, : 13 - 27
  • [29] Avoid Suspicious Route of Blackhole Nodes in MANET's: Using A Cooperative Trapping
    Esaid A.
    Agoyi M.
    Computer Systems Science and Engineering, 2023, 45 (02): : 1901 - 1915
  • [30] Technique for Detection of Cooperative Black Hole Attack in MANET
    Wahane, Gayatri
    Lonare, Savita
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,