Skip to main content
Log in

A collaborative routing protocol against routing disruptions in MANETs

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks (MANETs) are vulnerable to active attacks, such as dropping attacks, replay attacks, collusion attacks, and tampering attacks. Many researches have been proposed to provide security transmission. However, they cannot effectively and efficiently resist colluding attacks. Therefore, we propose a collaborative routing protocol (CRP) to detect and isolate colluding attackers via monitor mechanism. Monitor nodes observe and record the behavior of intermediate nodes. Based on the records of intermediate nodes, source node can distinguish malicious nodes and isolate them. Finally, security analyses and simulation verify that CRP can effectively and efficiently resist black hole attacks, gray hole attacks, modify and fake packet attacks, rushing attacks, and collusion attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput Commun Rev 24(4):234–244

    Article  Google Scholar 

  2. Johnson DB, Maltz DA, Hu YC, Jetcheva JG (2001) The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF MANET Working Group Internet-raft (draft-ietf-manet-dsr-05.txt). http://www.monarch.cs.rice.edu/internet-drafts/draft-ietf-manet-dsr-05.txt

  3. Johnson D, Hu Y, Maltz D (2007) The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. IETF 4(4728):1−108

    Google Scholar 

  4. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: IEEE workshop on mobile computing systems and applications (WMCSA). pp 90–100

  5. Perkins C, Royer EB, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. IETF 1(3561):1−38

    Google Scholar 

  6. Haas ZJ, Pearlman MR (2000) The zone routing protocol: a hybrid framework for routing in ad hoc networks. In: Perkins CE (ed) Ad hoc networking. Addison-Wesley, Reading, MA

  7. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: The annual international conference on mobile computing and networking (MobiCom). pp 255–265

  8. Nasser N, Chen Y (2007) Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: The IEEE international conference on communications. pp 1154–1159

  9. Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346

    Google Scholar 

  10. Martin Leo Manickam J, Shanmugavel S (2007) Providing routing security using ROS protocol in MANET and performance comparison with AODV. Inf Technol J 6(5):656–663

  11. Crepeau C, Davis CR, Maheswaran M (2007) A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. IEEE Adv Inf Netw Appl Workshops 2:19–26

    Google Scholar 

  12. Gerhards-Padilla E, Aschenbruck N, Martini P, Jahnke M, Tolle J (2007) Detecting black hole attacks in tactical MANETs using topology graphs. In: 32nd IEEE conference on local computer networks. pp 1043–1052

  13. Imani M, Taheri M, Naderi M (2010) Security enhanced routing protocol for ad hoc networks. J Convergence 1(1):43−47

    Google Scholar 

  14. Huang C, Cheng R, Chen S, Li C. Enhancing network availability by tolerance control in multi-sink wireless sensor networks. J Convergence 1(1):35–42

  15. Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs. J Convergence 2(1):23–30

    Google Scholar 

  16. Xie B, Kumar A, Zhao D, Reddy R, He B. (2010) On secure communication in integrated heterogeneous wireless networks. Int J Inf Technol Commun Convergence 1(1):4−23

    Google Scholar 

  17. Chang J, Yang H, Chao H, Chen J (2010) Multipath design for 6LoWPAN ad hoc on-demand distance vector routing. Int J Inf Technol Commun Convergence 1(1):24−40

    Google Scholar 

  18. Yu W, Sun Y, Liu KJR (2005) HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM. pp 1252–1261

  19. Eriksson J, Faloutsos M, Krishnamurthy S.V. (2007) Routing amid colluding attackers. IEEE international conference on network protocols. pp 184–193

  20. Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. Acad Publ J Netw 3(5):13–20

    Google Scholar 

  21. Kim H, Chitti RB, Song J (2011) Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks. J inf Process Syst 7(1):137–150

    Google Scholar 

  22. Obaidat MS, Dhurandher SK, Diwakar K (2011) CASPER: Congestion aware selection of path with efficient routing in multimedia networks. J Inf Process Syst 7(2):241–260

    Google Scholar 

  23. Hu Y-C, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: The annual international conference on mobile computing and networking (MobiCom). pp 23–28

  24. Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: ACM workshop on wireless security (WiSe03). pp 30–40

  25. Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Depend Secure Comput 3(4):386–399

    Google Scholar 

  26. Fall K, Varadhan K, (eds) The Ns manual (formerly called “ns notes and documentation”). The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, June 2007. Available from http://www.isi.edu/nsnam/ns/

  27. CMUMonarchGroup,CMUMonarchExtensions to theNS-2 Simulator 1998. Available from http://monarch.cs.cmu.edu/cmu-ns.html/

Download references

Acknowledgments

This work was supported in part by the National Science Council, Taiwan, under Contract NSC 99-2218-E-007- 012 and NSC 100-2628-E-007-018-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-Min Sun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, HM., Chen, CH., Yeh, CW. et al. A collaborative routing protocol against routing disruptions in MANETs. Pers Ubiquit Comput 17, 865–874 (2013). https://doi.org/10.1007/s00779-012-0537-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0537-y

Keywords

Navigation