Abstract
In mobile ad hoc network, the cooperation between the nodes is essential to discover and maintain routes. The node cooperation is not always guaranteed because of the misbehaving nodes which exist due to its constraint resources such as battery, bandwidth and computational power. When the node colludes to misbehave, it further makes the routing process difficult due to frequent network partitioning and it results in degrading the overall network throughput. This paper addresses three different kinds of packet dropping misbehavior and proposes a collaborative polling scheme to detect and isolate the colluding packet droppers. The simulation result shows that packet drop ratio, malicious packet drop and false detection has been greatly reduced when compared to the existing system under both entity and group mobility scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hong, X., Gerla, M., Pei, G., Chiang, C.: A Group Mobility Model for Ad Hoc Wireless Networks. In: 2nd ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems, pp. 53–60. ACM, Seattle (1999)
Johnson, D.B., Maltz, D.A., Broch, J.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet Draft, The Internet Engineering Task Force (1999)
Hong, X., Gerla, M., Pei, G., Chiang, C.: A Wireless Hierarchical Routing Protocol with Group Mobility. In: IEEE Wireless Communications and Networking Conference, pp. 1536–1540. IEEE, New Orleans (1999)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th International Conference on Mobile Computing and Networking, pp. 255–265. ACM, Boston (2000)
Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. J. Wireless Communication and Mobile Computing 2, 483–502 (2002)
Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 226–236. ACM, Lausanne (2002)
Michiardi, P., Molva, R.: CORE: A COllaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. In: 6th Joint Working Conference on Communications and Multimedia Security, vol. 228, pp. 107–121. Kluwer, Portoroz (2002)
Tseng, Y.C., Ni, S.Y., Chen, Y.S., Sheu, J.P.: The Broadcast Storm Problem in a Mobile Ad Hoc Network. J. Wireless Networks 8, 153–167 (2002)
Bansal, S., Baker, M.: Observation-based Cooperation Enforcement in Ad hoc Networks. Technical Report, Stanford University (2003)
Hu, J., Burmester, M.: LARS A Locally Aware Reputation System for Mobile Ad Hoc Networks. In: 44th Annual Southeast Regional Conference, pp. 119–123. ACM, Melbourne (2006)
Gopalakrishnan, K., Rhymend Uthariaraj, V.: Scenario based Evaluation of the Impact of Misbehaving Nodes in Mobile Ad Hoc Networks. In: 1st IEEE International Conference on Advanced Computing, pp. 45–50. IEEE Computer Society, Chennai (2009)
Gopalakrishnan, K., Rhymend Uthariaraj, V.: Local monitoring based reputation system with alert to mitigate the misbehaving nodes in mobile ad hoc networks. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 344–349. Springer, Heidelberg (2010)
Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil Attack in Mobile Ad hoc Networks. In: Proceedings of Securecomm and Workshops, pp. 1–11. IEEE Digital Library, Baltimore (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gopalakrishnan, K., Rhymend Uthariaraj, V. (2011). Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-22540-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22539-0
Online ISBN: 978-3-642-22540-6
eBook Packages: Computer ScienceComputer Science (R0)