Abstract
A Mobile Ad-hoc Network (MANET) is an infrastructure-less network, operated and managed by the nodes themselves. Inherently secure routing protocols are must for operational continuity of such networks which requires sustained and benevolent behavior by all participating nodes. A number of secure routing protocols based on trust have recently been proposed, which are able to detect routing misbehavior in the direct neighborhood of a node. However, collusion of misbehaving nodes has not been adequately addressed yet. In this paper, we present and evaluate a protocol, in which multipath routing combined with trust information of the nodes involved, are used to detect misbehaviors on data delivery formed by one or more misbehaving nodes in an ad hoc network. Data and control packets are transmitted through node-disjoint trust-worthy paths. Our protocol is able to withstand against attacks carried out by multiple malicious nodes acting in collusion. We take advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality and robustness of transmitted data. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kargl, F., Schlott, S., Klenk, A., Geiss, A., Weber, M.: Securing Ad hoc Routing Protocols. In: EUROMICRO 2004 (2004)
Poonam, G.K., Misra, M.: Trust based multi path DSR protocol. In: Proceedings of IEEE Fifth International Conference on Availability, Reliability and Security, Poland, pp. 204–209 (February 2010)
Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). In: Internet draft IETF RFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt
Wang, C., Yang, X., Gao, Y.: A Routing Protocol Based on Trust for MANETs. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 959–964. Springer, Heidelberg (2005)
Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, Finland, pp. 58–62 (2004)
Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of IEEE International Conference Networks, Singapore, pp. 326–330 (2004)
Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), TX, San Antonio (January 2002)
Burmester, M., Van Le, T.: Secure multipath communication in mobile ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004). IEEE, Las Vegas (April 2004)
Djenouri, D., Badache, N.: Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks. In: de Meer, H., Sterbenz, J.P.G. (eds.) IWSOS 2006. LNCS, vol. 4124, pp. 163–176. Springer, Heidelberg (2006)
Lee, S., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of the IEEE ICC, pp. 3201–3205 (2001)
Poonam, G.K., Misra, M.: Trust Enhanced Secure Multi-Path Routing Protocol for Detecting and Mitigating Misbehaving Nodes. In: Proceedings of ACM International Conference and Workshop on Emerging Trends in Technology, pp. 109–114 (2010)
QUALNET simulator, http://www.scalable-networks.com
IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poonam, Garg, K., Misra, M. (2010). Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)