Skip to main content

Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET

  • Conference paper
  • 3471 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Abstract

A Mobile Ad-hoc Network (MANET) is an infrastructure-less network, operated and managed by the nodes themselves. Inherently secure routing protocols are must for operational continuity of such networks which requires sustained and benevolent behavior by all participating nodes. A number of secure routing protocols based on trust have recently been proposed, which are able to detect routing misbehavior in the direct neighborhood of a node. However, collusion of misbehaving nodes has not been adequately addressed yet. In this paper, we present and evaluate a protocol, in which multipath routing combined with trust information of the nodes involved, are used to detect misbehaviors on data delivery formed by one or more misbehaving nodes in an ad hoc network. Data and control packets are transmitted through node-disjoint trust-worthy paths. Our protocol is able to withstand against attacks carried out by multiple malicious nodes acting in collusion. We take advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality and robustness of transmitted data. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kargl, F., Schlott, S., Klenk, A., Geiss, A., Weber, M.: Securing Ad hoc Routing Protocols. In: EUROMICRO 2004 (2004)

    Google Scholar 

  2. Poonam, G.K., Misra, M.: Trust based multi path DSR protocol. In: Proceedings of IEEE Fifth International Conference on Availability, Reliability and Security, Poland, pp. 204–209 (February 2010)

    Google Scholar 

  3. Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). In: Internet draft IETF RFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt

  4. Wang, C., Yang, X., Gao, Y.: A Routing Protocol Based on Trust for MANETs. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 959–964. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, Finland, pp. 58–62 (2004)

    Google Scholar 

  6. Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of IEEE International Conference Networks, Singapore, pp. 326–330 (2004)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), TX, San Antonio (January 2002)

    Google Scholar 

  8. Burmester, M., Van Le, T.: Secure multipath communication in mobile ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004). IEEE, Las Vegas (April 2004)

    Google Scholar 

  9. Djenouri, D., Badache, N.: Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks. In: de Meer, H., Sterbenz, J.P.G. (eds.) IWSOS 2006. LNCS, vol. 4124, pp. 163–176. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Lee, S., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of the IEEE ICC, pp. 3201–3205 (2001)

    Google Scholar 

  11. Poonam, G.K., Misra, M.: Trust Enhanced Secure Multi-Path Routing Protocol for Detecting and Mitigating Misbehaving Nodes. In: Proceedings of ACM International Conference and Workshop on Emerging Trends in Technology, pp. 109–114 (2010)

    Google Scholar 

  12. QUALNET simulator, http://www.scalable-networks.com

  13. IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poonam, Garg, K., Misra, M. (2010). Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics