Abstract
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. We present evaluation results that demonstrate the operation of our algorithm in mobile ad hoc environments and show that it effectively detects nodes that drop a significant fraction of packets.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bharghavan, V., Demers, A., Shenker, S., Zhang, L.: MACAW: A Media Access Protocol for Wireless LANs. ACM SIGCOMM Computer Communication Review 24(4), 212–225 (1994)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, September 2002, pp. 12–23 (2002)
Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 261–273 (2006)
Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks – part I. IEEE Journal on Selected Areas in Communications 24, 274–289 (2006)
Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks – part II. IEEE Journal on Selected Areas in Communications 24, 290–304 (2006)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE workshop on Mobile Computing Systems & Applications, June 2002, pp. 3–13 (2002)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002, pp. 193–204 (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, November 2002, pp. 78–87 (2002)
Guerrero-Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10 (2002)
Guerrero-Zapata, M.: Secure ad hoc on-demand distance vector (SAODV) routing. Internet Draft, IETF Mobile Ad Hoc Networking Working Group, draft-guerrero-manet-saodv-05.txt (February 2005)
Hubaux, J.P., Buttyán, L., Čapkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 146–155 (2001)
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 24(4), 234–244 (1994)
Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computer Systems & Applications, pp. 90–100 (1999)
Perkins, C.E.: Ad hoc on-demand distance vector (AODV) routing. Request For Comments (RFC) 3561 (July 2003), available at: http://www.ietf.org/rfc/rfc3561.txt
Johnson, D.B., Maltz, D.A., Hu, Y.C.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, IETF MANET Working Group, draft-ietf-manet-dsr-10.txt (July 2004)
Awerbuch, B., Holmes, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to Byzantine failures. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 21–30 (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2000, pp. 56–73 (2000)
Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236 (2002)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 275–283 (2000)
Papadimitratos, P., Haas, Z.: Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 343–356 (2006)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols, November 2001, pp. 251–260 (2001)
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine 13(6) (1999)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile ad hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 255–265 (2000)
Rao, R., Kesidis, G.: Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In: Proceedings of the 2003 IEEE Global Telecommunications Conference, vol. 5, pp. 2957–2961 (2003)
Bradley, K.A., Cheung, S., Puketza, N., Mukherjee, B., Olsson, R.A.: Detecting disruptive routers: a distributed network monitoring approach. In: Proceedings of the 1998 Symposium on Security and Privacy, May 1998, pp. 115–124 (1998)
Karn, P.: MACA – a new channel access method for packet radio. In: ARRL/CRRL Amateur Radio 9th Computer Networking Conference, September 1990, pp. 134–240 (1990)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Gonzalez, O.F., Howarth, M., Pavlou, G. (2007). Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds) Wired/Wireless Internet Communications. WWIC 2007. Lecture Notes in Computer Science, vol 4517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72697-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-72697-5_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72694-4
Online ISBN: 978-3-540-72697-5
eBook Packages: Computer ScienceComputer Science (R0)