Skip to main content

A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks

  • Conference paper
Book cover Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

In this manuscript we deal with securing routing protocol of mobileadhoc network against Non forwarding nodes which originate selfish or passive attack .due to its unique feature of open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Further most of the mobile adhoc routing protocols assume that nodes are trust worthy and cooperative this renders them vulnerable to various types of attacks. In this scheme the nodes which originate the passive or selfish attacks are identified and isolated from the routing and data forwarding function. We considered DSR protocol in NS-2 for our simulation. The results obtained illustrates that the proposed scheme outscores the traditional DSR in all metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sun, B., Young, L.O.: Intrusion detecti on techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 56–63 (2007)

    Google Scholar 

  2. Murthy, S., Garcia-Luna-Aceves, J.J.: An effi cient routing protocol for wireless networks. ACM Mobile Networks Appl., 183–197 (1996)

    Google Scholar 

  3. Djenouri, D., Badache, N.: New power- aware routing protocol for mobile adhoc network. International Journal of Adhoc Ubiquitous Computing, 126–136 (2006)

    Google Scholar 

  4. Buchegger, S., Boudec, J.-Y.: The sel fish node: Increasing routing security for mobile adhoc networks. LCA-Report-2001-008

    Google Scholar 

  5. Chen, K., Nahrstedt, K.: IPass: An incentive compatible auction scheme to enable packet forwarding service in MANET. In: Proceeding of the 24th International Conference on Distributed Computing System, Tokyo, pp. 534–542 (2004)

    Google Scholar 

  6. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Adhoc wireless networking. Mobile Computing 353, 153–181 (1996)

    Article  Google Scholar 

  7. Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, DSR (2002) (Internet Draft)

    Google Scholar 

  8. Perkins, C.E., Royer, E.M., Das, S.: Adhoc On-demand Distance Vector (AODV) Routing. RFC 3561 (2003)

    Google Scholar 

  9. Murphy, S.: Routing Protocol Threat Analysis. Internet Draft (2002)

    Google Scholar 

  10. Zhang, K.: Efficient Protocols for Signing Routing Messages. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS 1998), SanDiego, CA, pp. 29–35 (1998)

    Google Scholar 

  11. Kong, J.: Adaptive Security for Multi-layer Ad Hoc Networks. In: Special Issue of Wireless Communications and Mobile Computing. John Wiley Interscience Press, Chichester (2002)

    Google Scholar 

  12. Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J., LeBoudec, J.: Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine 39(6), 166–174 (2001)

    Article  Google Scholar 

  13. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. 6th Annual Int. Conf. on Mobile computing and Networking (MobiCom 2000), Boston, MA, pp. 255–265 (2000)

    Google Scholar 

  14. Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. Cooperation of Nodes - Fairness in Dynamic Ad-hoc Networks. Technical Report (IC/2002/01), EPFL I&C, Lausanne (2002)

    Google Scholar 

  15. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile ad Hocnetworking & Computing, Lausanne, Switzerland, pp. 226–236 (2002)

    Google Scholar 

  16. Buchegger, S., Boudec, J.-Y.L.: Nodes Bearing Grudges towards Routing Security, Fairness and robustness in Mobile ad hoc networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network–Based Processing, pp. 403–410 (2002)

    Google Scholar 

  17. Dawkins, R.: The selfish Gene, 1980th edn. Oxford University Press, Oxford

    Google Scholar 

  18. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks. In: Proceedings of 7th International Workshop on Security Protocols, Cambridge, UK, pp. 172–194 (1999)

    Google Scholar 

  19. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine, Special Issue on Networking Security 13(6), 24–30 (1999)

    Google Scholar 

  20. Hubaux, J., Buttyan, L., Capkun, S.: The quest for security in Mobile Ad hoc Networks. In: Proceedings of the ACM Symposium on Mobile Ad hoc Networking and Computing, MobiHOC (2001)

    Google Scholar 

  21. Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks. In: Proceedings of the 2nd ACM Workshop on Wireless Security, San Diego, CA, USA, pp. 41–50 (2003)

    Google Scholar 

  22. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand Routing protocol for ad hoc networks. In: Proceedings of 8th ACM International Conference on Mobile Computing and Networking (2002)

    Google Scholar 

  23. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In: Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3–13 (2002)

    Google Scholar 

  24. Dahill, Levine, Royer, Shields: A Secure routing protocol for adhoc networks. In: Proceedings of the International Conference on Network Protocols (ICNP), pp. 78–87 (2002)

    Google Scholar 

  25. Fall, K., Varadhan, K.: The ns manual, http://www.isi.edu/nsnam/ns/doc/index.html

  26. Broch, J., Johnson, D., Maltz, D., Hu, Y., Jetcheva, J.: A Performance Comparison of Multihop Wireless Ad Hoc Networking Protocols. In: Proceedings of 4th ACM/IEEE International Conference on Mobile Computing and Networking (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhalaji, N., Shanmugam, A. (2010). A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics