Misbehavior Node detection in Wireless Ad Hoc Networks using Overhearing Techniques

Abstract

The nodes in the wireless network co-operate with each other in data transmission. The data packets transfer from source to destination nodes. Some nodes in the network participate well in routing operations such as the route discovery, and route maintenance. But the node behaves selfishly in forwarding the data packets due to wastage of a battery power, and other resources. The wireless network has open challenge to identify and separate the misbehave nodes in the networks. The misbehave nodes lead to a high energy consumption and an overhead in the network. To overcome the limitations of the wireless Ad Hoc networks, in this research paper, we have proposed two novel approaches. In the first approach, the source node calculates the packet forward ratio and identifies misbehave nodes in the network. This approach is called the Overhearing Based Misbehavior Detection (OMD) approach. Where In first approach we have to calculate the packet forwarding ratio in which neighbor overhears transmissions and its own transmissions, then our second approach is Autonomous Agent-based Misbehavior Detection approach where the AAMD scheme generates the secret key to verify the misbehavior of the node using the agent. It also utilizes the past behavior of the node to identify possibilities. We have proposed both the approaches to achieve the better QoS and to reduce the network overhead and delay. The implementation is based on NS2 software and comparison of the simulation results of the proposed approaches.

Country : India

1 T. N. Sawant2 Mitesh Gupta3 Vijay Ingle4 Divyani Kadam5 Sneha Khatke

  1. Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  2. Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  3. Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  4. Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
  5. Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India

IRJIET, Volume 5, Issue 5, May 2021 pp. 68-73

doi.org/10.47001/IRJIET/2021.505011

References

  1. Visconti and H. Tahayori, “Detecting misbehaving nodes in manet with an artificial immune system based on type-2 fuzzy sets, International Conference for Internet Technology and, Secured Transactions, , ICITST’09, pp. 1–2,2009.
  2. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, “Self-securing Ad Hoc wireless networks,” in Proc. of ISCC, 2002.
  3. R. R. Rout and S. K. Ghosh, “Enhancement of lifetime using duty cycle and network coding in wireless sensor networks ,” IEEE Transaction on Wireless Communication, vol. 12, no. 2, pp. 656–667,2013.
  4. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile Ad Hoc networks,” IEEE Communications, , vol. 14, no. 5, pp. 85– 91, 2007.
  5. A.B. Abderrahmane Baadache, “Fighting against packet dropping misbehavior in multi-hop wireless Ad Hoc networks,” J. Network and Computer Applications, vol. 35, no. 3, pp. 1130–1139, 2012.
  6. D. Djenouri and N. Badache, “On eliminating packet droppers in manet: A modular solution,” Ad Hoc Networks, vol. 7, no. 6, pp. 1243–1258, 2009.
  7. F. Kargl, a. Klenk, M. Weber, and S. Schlott, “Advanced detection of selfish or malicious nodes in Ad Hoc networks,” in 1st European Workshop on Security in Ad Hoc and Sensor NetworksHeidlberg, Germany, Aug 5-6, 2004, 2004.
  8. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement based approach for detection of routing misbehavior in manets,” IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536–550, 2007
  9. S. Zhang, J. Chen, and Y.R.Yang, “Sprite : A simple cheat-proof, credit based system for mobile Ad Hoc networks,” in Proc. of INFOCOM, 2003, pp. 1987–1997.
  10. L. Buttyan and J. P. hubaux, “Stimulating cooperation in self organizing mobile Ad Hoc networks,” Mobile Net. and Application, vol. 8, no. 5, pp. 579–592, 2003.
  11. J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentive for collaboration in mobile Ad Hoc network,” in Proc. of WiOpt, 2003.
  12. S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1–37, 2008.
  13. Q. He, D. Wu, and K. Khosla, “Sori: A secure and objective reputation based incentive scheme for Ad Hoc networks,” in In Proc. of WCNC, 2004.
  14. S. Buchegger and J. Y. L. Boudec, “Self policing mobile Ad Hoc networks by reputation systems,” in IEEE Comm. Magazine, 2005, pp. 101–107.
  15. L. Miranda, H.and Rodrigues, “Preventing selfishness in open mobile Ad Hoc networks,” in Proc. of Seventh CaberNet Radicals Workshop, 2002.
  16. S. Buchegger and J. Y. L. Boudec, “Performance analysis of the confidant protocol: Cooperation of nodes, fairness in dynamic Ad Hoc networks,” in Proc. of MobiHoc, 2002.
  17. P. Michiardi and R. C. Molva, “A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks,” in The 6th IFIP Communication and Multimedia Security Conference, Portoroz, Slovenia, Sep 26-27, 2002, 2002.
  18. K. Balakrishnan, J. Deng, and P. K. Varshney, “Twoack: Preventing selfish node in mobile Ad Hoc networks,” in Proc. of WCNC, 2005.
  19. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotary, and H. Rubens, “Odsbr: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks,” ACM Transactions on Information Syatem Security, vol. 10, no. 4, pp. 11–35, 2008.
  20. Y. Xue and K. Nahrstedt, “Providing fault- tolerant Ad Hoc routing services in adversial enviornment,” Wireless Personal Communications, special issue on security for next generation communications, vol. 29, no. 3, pp. 367–388, 2004.
  21. A.S. Anandukey and C. M., “Detection of packet dropping attack using improved acknowledgement based scheme in manet,” International Journal of Computer Science Issues I, vol. 7, no. 1, pp. 12–17, 2010..
  22. S. Manvia, L. B. Bhajantrib, and V. K. Vagga, “Routing misbehavior detection in manets using 2ack,” Journal of Telecommunication and Information Technology, vol. 4, no. 1, pp. 105–111, 2010.
  23. Y. Zhang, L. Lazos, and W. J. Kozma, “Amd : Audit baesd misbehavior detection in wireless Ad Hoc networks,” IEEE Transactions on Mobile Computing, 2013.
  24. R. Perrig, A. Canetti, J. D. Tygar, and D. Song, “The tesla broadcast authentication protocol,” in CryptoBytes, vol. 5, no. 2, 2002, pp. 2– 13.
  25. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile Ad Hoc networks,” in In Proc. MobiHoc, 2000
  26. S. Samreen and G. Narasimha, “An efficient approach for detection of node misbehavior in a manet based on link behavior,” IEEE International Journal of Advance Computing Conference, pp. 588– 592, 2012.
  27. L. Buttyan and J. P. Hubaux, “Enforcing service availability in mobile Ad Hoc wans,” in In Proc. MobiHoc, 2000.
  28. V. Bharghavan, A. Dermers, S. Shenker, and L. Zhang, “Macaw: A medium access protocol for wireless lans,” in In Proc. of ACM SIGCOMM ’94, 1994.
  29. D. Johnson, A. Maltz, and J. Broch, “The dynamic protocol for mobile Ad Hoc networks,” in Mobile Ad Hoc Network Working Group, IETF, 1999.
  30. G. Simon, P. Vlgyesi, M. Marti, and A. Ldeczi, “Simulation-based optimization of communication protocols for large-scale wireless sensor networks,” IEEECA, 2003.