Misbehavior Node detection in Wireless Ad Hoc Networks using Overhearing Techniques
Abstract
The nodes in the wireless network co-operate with each other in data
transmission. The data packets transfer from source to destination nodes. Some
nodes in the network participate well in routing operations such as the route
discovery, and route maintenance. But the node behaves selfishly in forwarding
the data packets due to wastage of a battery power, and other resources. The
wireless network has open challenge to identify and separate the misbehave
nodes in the networks. The misbehave nodes lead to a high energy consumption
and an overhead in the network. To overcome the limitations of the wireless Ad
Hoc networks, in this research paper, we have proposed two novel approaches. In
the first approach, the source node calculates the packet forward ratio and
identifies misbehave nodes in the network. This approach is called the
Overhearing Based Misbehavior Detection (OMD) approach. Where In first approach
we have to calculate the packet forwarding ratio in which neighbor overhears
transmissions and its own transmissions, then our second approach is Autonomous
Agent-based Misbehavior Detection approach where the AAMD scheme generates the
secret key to verify the misbehavior of the node using the agent. It also
utilizes the past behavior of the node to identify possibilities. We have
proposed both the approaches to achieve the better QoS and to reduce the
network overhead and delay. The implementation is based on NS2 software and
comparison of the simulation results of the proposed approaches.
Country : India
1 T. N. Sawant2 Mitesh Gupta3 Vijay Ingle4 Divyani Kadam5 Sneha Khatke
Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
Department of Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India
Visconti and H. Tahayori,
“Detecting misbehaving nodes in manet with an artificial immune system based on
type-2 fuzzy sets, International Conference for Internet Technology and,
Secured Transactions, , ICITST’09, pp. 1–2,2009.
H. Luo, P. Zerfos, J. Kong, S. Lu,
and L. Zhang, “Self-securing Ad Hoc wireless networks,” in Proc. of ISCC, 2002.
R. R. Rout and S. K. Ghosh,
“Enhancement of lifetime using duty cycle and network coding in wireless sensor
networks ,” IEEE Transaction on Wireless Communication, vol. 12, no. 2, pp. 656–667,2013.
Kannhavong, H. Nakayama, Y. Nemoto,
N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile Ad Hoc
networks,” IEEE Communications, , vol. 14, no. 5, pp. 85– 91, 2007.
A.B. Abderrahmane Baadache,
“Fighting against packet dropping misbehavior in multi-hop wireless Ad Hoc
networks,” J. Network and Computer Applications, vol. 35, no. 3, pp. 1130–1139,
2012.
D. Djenouri and N. Badache, “On
eliminating packet droppers in manet: A modular solution,” Ad Hoc Networks,
vol. 7, no. 6, pp. 1243–1258, 2009.
F. Kargl, a. Klenk, M. Weber, and
S. Schlott, “Advanced detection of selfish or malicious nodes in Ad Hoc
networks,” in 1st European Workshop on Security in Ad Hoc and Sensor
NetworksHeidlberg, Germany, Aug 5-6, 2004, 2004.
K. Liu, J. Deng, P. Varshney, and
K. Balakrishnan, “An acknowledgement based approach for detection of routing
misbehavior in manets,” IEEE Transactions on Mobile Computing, vol. 6, no. 5,
pp. 536–550, 2007
S. Zhang, J. Chen, and Y.R.Yang,
“Sprite : A simple cheat-proof, credit based system for mobile Ad Hoc
networks,” in Proc. of INFOCOM, 2003, pp. 1987–1997.
L. Buttyan and J. P. hubaux,
“Stimulating cooperation in self organizing mobile Ad Hoc networks,” Mobile
Net. and Application, vol. 8, no. 5, pp. 579–592, 2003.
J. Crowcroft, R. Gibbens, F. Kelly,
and S. Ostring, “Modelling incentive for collaboration in mobile Ad Hoc
network,” in Proc. of WiOpt, 2003.
S. Ganeriwal, L. Balzano, and M.
Srivastava, “Reputation based framework for high integrity sensor networks,”
ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1–37, 2008.
Q. He, D. Wu, and K. Khosla, “Sori:
A secure and objective reputation based incentive scheme for Ad Hoc networks,”
in In Proc. of WCNC, 2004.
S. Buchegger and J. Y. L. Boudec,
“Self policing mobile Ad Hoc networks by reputation systems,” in IEEE Comm.
Magazine, 2005, pp. 101–107.
L. Miranda, H.and Rodrigues,
“Preventing selfishness in open mobile Ad Hoc networks,” in Proc. of Seventh
CaberNet Radicals Workshop, 2002.
S. Buchegger and J. Y. L. Boudec, “Performance
analysis of the confidant protocol: Cooperation of nodes, fairness in dynamic
Ad Hoc networks,” in Proc. of MobiHoc, 2002.
P. Michiardi and R. C. Molva, “A
collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc
networks,” in The 6th IFIP Communication and Multimedia Security Conference,
Portoroz, Slovenia, Sep 26-27, 2002, 2002.
K. Balakrishnan, J. Deng, and P. K.
Varshney, “Twoack: Preventing selfish node in mobile Ad Hoc networks,” in Proc.
of WCNC, 2005.
B. Awerbuch, R. Curtmola, D.
Holmer, C. Nita-Rotary, and H. Rubens, “Odsbr: An on-demand secure byzantine
resilient routing protocol for wireless Ad Hoc networks,” ACM Transactions on
Information Syatem Security, vol. 10, no. 4, pp. 11–35, 2008.
Y. Xue and K. Nahrstedt, “Providing
fault- tolerant Ad Hoc routing services in adversial enviornment,” Wireless
Personal Communications, special issue on security for next generation
communications, vol. 29, no. 3, pp. 367–388, 2004.
A.S. Anandukey and C. M.,
“Detection of packet dropping attack using improved acknowledgement based
scheme in manet,” International Journal of Computer Science Issues I, vol. 7,
no. 1, pp. 12–17, 2010..
S. Manvia, L. B. Bhajantrib, and V.
K. Vagga, “Routing misbehavior detection in manets using 2ack,” Journal of
Telecommunication and Information Technology, vol. 4, no. 1, pp. 105–111, 2010.
Y. Zhang, L. Lazos, and W. J.
Kozma, “Amd : Audit baesd misbehavior detection in wireless Ad Hoc networks,”
IEEE Transactions on Mobile Computing, 2013.
R. Perrig, A. Canetti, J. D. Tygar,
and D. Song, “The tesla broadcast authentication protocol,” in CryptoBytes,
vol. 5, no. 2, 2002, pp. 2– 13.
S. Marti, T. Giuli, K. Lai, and M.
Baker, “Mitigating routing misbehavior in mobile Ad Hoc networks,” in In Proc.
MobiHoc, 2000
S. Samreen and G. Narasimha, “An
efficient approach for detection of node misbehavior in a manet based on link
behavior,” IEEE International Journal of Advance Computing Conference, pp. 588–
592, 2012.
L. Buttyan and J. P. Hubaux,
“Enforcing service availability in mobile Ad Hoc wans,” in In Proc. MobiHoc,
2000.
V. Bharghavan, A. Dermers, S.
Shenker, and L. Zhang, “Macaw: A medium access protocol for wireless lans,” in
In Proc. of ACM SIGCOMM ’94, 1994.
D. Johnson, A. Maltz, and J. Broch,
“The dynamic protocol for mobile Ad Hoc networks,” in Mobile Ad Hoc Network
Working Group, IETF, 1999.
G. Simon, P. Vlgyesi, M. Marti, and
A. Ldeczi, “Simulation-based optimization of communication protocols for
large-scale wireless sensor networks,” IEEECA, 2003.