Skip to main content

Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks

  • Conference paper
Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

  • 2312 Accesses

Abstract

In mobile ad hoc network, the cooperation between the nodes is essential to discover and maintain routes. The node cooperation is not always guaranteed because of the misbehaving nodes which exist due to its constraint resources such as battery, bandwidth and computational power. When the node colludes to misbehave, it further makes the routing process difficult due to frequent network partitioning and it results in degrading the overall network throughput. This paper addresses three different kinds of packet dropping misbehavior and proposes a collaborative polling scheme to detect and isolate the colluding packet droppers. The simulation result shows that packet drop ratio, malicious packet drop and false detection has been greatly reduced when compared to the existing system under both entity and group mobility scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hong, X., Gerla, M., Pei, G., Chiang, C.: A Group Mobility Model for Ad Hoc Wireless Networks. In: 2nd ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems, pp. 53–60. ACM, Seattle (1999)

    Google Scholar 

  2. Johnson, D.B., Maltz, D.A., Broch, J.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet Draft, The Internet Engineering Task Force (1999)

    Google Scholar 

  3. Hong, X., Gerla, M., Pei, G., Chiang, C.: A Wireless Hierarchical Routing Protocol with Group Mobility. In: IEEE Wireless Communications and Networking Conference, pp. 1536–1540. IEEE, New Orleans (1999)

    Google Scholar 

  4. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th International Conference on Mobile Computing and Networking, pp. 255–265. ACM, Boston (2000)

    Google Scholar 

  5. Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. J. Wireless Communication and Mobile Computing 2, 483–502 (2002)

    Article  Google Scholar 

  6. Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 226–236. ACM, Lausanne (2002)

    Google Scholar 

  7. Michiardi, P., Molva, R.: CORE: A COllaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. In: 6th Joint Working Conference on Communications and Multimedia Security, vol. 228, pp. 107–121. Kluwer, Portoroz (2002)

    Google Scholar 

  8. Tseng, Y.C., Ni, S.Y., Chen, Y.S., Sheu, J.P.: The Broadcast Storm Problem in a Mobile Ad Hoc Network. J. Wireless Networks 8, 153–167 (2002)

    Article  MATH  Google Scholar 

  9. Bansal, S., Baker, M.: Observation-based Cooperation Enforcement in Ad hoc Networks. Technical Report, Stanford University (2003)

    Google Scholar 

  10. Hu, J., Burmester, M.: LARS A Locally Aware Reputation System for Mobile Ad Hoc Networks. In: 44th Annual Southeast Regional Conference, pp. 119–123. ACM, Melbourne (2006)

    Chapter  Google Scholar 

  11. Gopalakrishnan, K., Rhymend Uthariaraj, V.: Scenario based Evaluation of the Impact of Misbehaving Nodes in Mobile Ad Hoc Networks. In: 1st IEEE International Conference on Advanced Computing, pp. 45–50. IEEE Computer Society, Chennai (2009)

    Google Scholar 

  12. Gopalakrishnan, K., Rhymend Uthariaraj, V.: Local monitoring based reputation system with alert to mitigate the misbehaving nodes in mobile ad hoc networks. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 344–349. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil Attack in Mobile Ad hoc Networks. In: Proceedings of Securecomm and Workshops, pp. 1–11. IEEE Digital Library, Baltimore (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gopalakrishnan, K., Rhymend Uthariaraj, V. (2011). Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics