Abstract
Mobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxious about its battery shortage, a node participating in the network and using the forwarding service provided by other nodes might behave selfishly and drop packets originated from others. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Another motivation to drop data packets is to launch a DoS (Denial of Service) attack. To do so, a node participates in the routing protocol and includes itself in routes then simply drops data packet it receives to forward. We propose in this paper a novel cross-layer based approach to detect data packet droppers, that we optimize and decrease its overhead. Contrary to all the current detective solutions, ours is applicable regardless of the power control technique employment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: The 6th ACM Conference on Mobile Computing and Networking, MOBICOM 2000, Boston, MA, USA, pp. 255–265 (2000)
Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: A library for the parallel simulation of large-scale wireless networks. In: The 12th Workshop on Parallel and distributed Simulation. PADS 1998, Banff, Alberta, Canada, pp. 154–161 (1998)
Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8 (2003)
Buttyan, L., Hubaux, J.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, Switzerland (2001)
Djenouri, D., Khalladi, L., Badache, N.: Security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys and Tutorials 7, 2–29 (2005)
Doshi, S., Brown, T.: Minimum energy routing schemes for a wireless ad hoc network. In: The 21st IEEE Annual Joint Conference on Computer Communications and Networking (INFOCOM 2002), New York, USA (2002)
Djenouri, D., Badache, N.: New power-aware routing for mobile ad hoc networks. The International Journal of Ad Hoc and Ubiquitous Computing (Inderscience) 1, 126–136 (2006)
Yang, H., Meng, X., Lu, S.: Self-organized network layer security in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2002), Georgia, Atlanta, USA (2002)
Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia (2002)
Buchegger, S., Le-Boudec, J.Y.: A robust reputation system for p2p and mobile ad-hoc networks. In: Second Workshop on the Economics of Peer-to-Peer Systems, Harvard university, Cambridge, MA, USA (2004)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: The 22st IEEE Annual Joint Conference on Computer Communications and Networking (INFOCOM 2003), San Francisco, CA, USA (2003)
Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: Cooperation in wireless ad hoc networks. In: The 22st IEEE Annual Joint Conference on Computer Communications and Networking (INFOCOM 2003), San Francisco, California, USA (2003)
Papadimitratos, P., Haas, Z.J.: Secure data transmission in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2003), San Diego, California, USA (2003)
Conti, M., Gregori, E., Maselli, G.: Towards reliable forwarding for ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 790–804. Springer, Heidelberg (2003)
Conti, M., Gregori, E., Maselli, G.: Improving the performability of data transfer in mobile ad hoc networks. In: The Second IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2005), Santa Clara, CA, USA (2005)
Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)
Djenouri, D., Badache, N.: New approach for selfish nodes detection in mobile ad hoc networks. In: The first IEEE/Creat-net Workshop on Integration of Security and Quality of Service (SecQoS 2005), Athens, Greece (2005)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2, 52–64 (2003)
Djenouri, D., Badache, N.: Cross-layer approach to detect data packet droppers in mobile ad-hoc networks: extended version. Technical Report LSI-TR-0606, USTHB University, Algiers, Algeria (2006)
Maltz, J.B.D., Hu, Y.C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: The fourth Annual ACM/IEEE International Conference On Mobile Computing And Networking (MobiCom 1998), Dallas, TX, USA, pp. 85–97 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Djenouri, D., Badache, N. (2006). Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks. In: de Meer, H., Sterbenz, J.P.G. (eds) Self-Organizing Systems. EuroNGI IWSOS 2006 2006. Lecture Notes in Computer Science, vol 4124. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11822035_14
Download citation
DOI: https://doi.org/10.1007/11822035_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37658-3
Online ISBN: 978-3-540-37669-9
eBook Packages: Computer ScienceComputer Science (R0)