Skip to main content

Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4517))

Included in the following conference series:

Abstract

Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. We present evaluation results that demonstrate the operation of our algorithm in mobile ad hoc environments and show that it effectively detects nodes that drop a significant fraction of packets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bharghavan, V., Demers, A., Shenker, S., Zhang, L.: MACAW: A Media Access Protocol for Wireless LANs. ACM SIGCOMM Computer Communication Review 24(4), 212–225 (1994)

    Article  Google Scholar 

  2. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, September 2002, pp. 12–23 (2002)

    Google Scholar 

  3. Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 261–273 (2006)

    Article  Google Scholar 

  4. Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks – part I. IEEE Journal on Selected Areas in Communications 24, 274–289 (2006)

    Article  Google Scholar 

  5. Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks – part II. IEEE Journal on Selected Areas in Communications 24, 290–304 (2006)

    Article  Google Scholar 

  6. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE workshop on Mobile Computing Systems & Applications, June 2002, pp. 3–13 (2002)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002, pp. 193–204 (2002)

    Google Scholar 

  8. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, November 2002, pp. 78–87 (2002)

    Google Scholar 

  9. Guerrero-Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10 (2002)

    Google Scholar 

  10. Guerrero-Zapata, M.: Secure ad hoc on-demand distance vector (SAODV) routing. Internet Draft, IETF Mobile Ad Hoc Networking Working Group, draft-guerrero-manet-saodv-05.txt (February 2005)

    Google Scholar 

  11. Hubaux, J.P., Buttyán, L., Čapkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 146–155 (2001)

    Google Scholar 

  12. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 24(4), 234–244 (1994)

    Article  Google Scholar 

  13. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computer Systems & Applications, pp. 90–100 (1999)

    Google Scholar 

  14. Perkins, C.E.: Ad hoc on-demand distance vector (AODV) routing. Request For Comments (RFC) 3561 (July 2003), available at: http://www.ietf.org/rfc/rfc3561.txt

  15. Johnson, D.B., Maltz, D.A., Hu, Y.C.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, IETF MANET Working Group, draft-ietf-manet-dsr-10.txt (July 2004)

    Google Scholar 

  16. Awerbuch, B., Holmes, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to Byzantine failures. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 21–30 (2002)

    Google Scholar 

  17. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2000, pp. 56–73 (2000)

    Google Scholar 

  18. Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236 (2002)

    Google Scholar 

  19. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 275–283 (2000)

    Google Scholar 

  20. Papadimitratos, P., Haas, Z.: Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 343–356 (2006)

    Article  Google Scholar 

  21. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols, November 2001, pp. 251–260 (2001)

    Google Scholar 

  22. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine 13(6) (1999)

    Google Scholar 

  23. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile ad hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 255–265 (2000)

    Google Scholar 

  24. Rao, R., Kesidis, G.: Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In: Proceedings of the 2003 IEEE Global Telecommunications Conference, vol. 5, pp. 2957–2961 (2003)

    Google Scholar 

  25. Bradley, K.A., Cheung, S., Puketza, N., Mukherjee, B., Olsson, R.A.: Detecting disruptive routers: a distributed network monitoring approach. In: Proceedings of the 1998 Symposium on Security and Privacy, May 1998, pp. 115–124 (1998)

    Google Scholar 

  26. Karn, P.: MACA – a new channel access method for packet radio. In: ARRL/CRRL Amateur Radio 9th Computer Networking Conference, September 1990, pp. 134–240 (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Fernando Boavida Edmundo Monteiro Saverio Mascolo Yevgeni Koucheryavy

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Gonzalez, O.F., Howarth, M., Pavlou, G. (2007). Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds) Wired/Wireless Internet Communications. WWIC 2007. Lecture Notes in Computer Science, vol 4517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72697-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72697-5_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72694-4

  • Online ISBN: 978-3-540-72697-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics