Abstract
Mobile ad hoc networks (MANETs) are vulnerable to active attacks, such as dropping attacks, replay attacks, collusion attacks, and tampering attacks. Many researches have been proposed to provide security transmission. However, they cannot effectively and efficiently resist colluding attacks. Therefore, we propose a collaborative routing protocol (CRP) to detect and isolate colluding attackers via monitor mechanism. Monitor nodes observe and record the behavior of intermediate nodes. Based on the records of intermediate nodes, source node can distinguish malicious nodes and isolate them. Finally, security analyses and simulation verify that CRP can effectively and efficiently resist black hole attacks, gray hole attacks, modify and fake packet attacks, rushing attacks, and collusion attacks.










Similar content being viewed by others
References
Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput Commun Rev 24(4):234–244
Johnson DB, Maltz DA, Hu YC, Jetcheva JG (2001) The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF MANET Working Group Internet-raft (draft-ietf-manet-dsr-05.txt). http://www.monarch.cs.rice.edu/internet-drafts/draft-ietf-manet-dsr-05.txt
Johnson D, Hu Y, Maltz D (2007) The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. IETF 4(4728):1−108
Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: IEEE workshop on mobile computing systems and applications (WMCSA). pp 90–100
Perkins C, Royer EB, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. IETF 1(3561):1−38
Haas ZJ, Pearlman MR (2000) The zone routing protocol: a hybrid framework for routing in ad hoc networks. In: Perkins CE (ed) Ad hoc networking. Addison-Wesley, Reading, MA
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: The annual international conference on mobile computing and networking (MobiCom). pp 255–265
Nasser N, Chen Y (2007) Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: The IEEE international conference on communications. pp 1154–1159
Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346
Martin Leo Manickam J, Shanmugavel S (2007) Providing routing security using ROS protocol in MANET and performance comparison with AODV. Inf Technol J 6(5):656–663
Crepeau C, Davis CR, Maheswaran M (2007) A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. IEEE Adv Inf Netw Appl Workshops 2:19–26
Gerhards-Padilla E, Aschenbruck N, Martini P, Jahnke M, Tolle J (2007) Detecting black hole attacks in tactical MANETs using topology graphs. In: 32nd IEEE conference on local computer networks. pp 1043–1052
Imani M, Taheri M, Naderi M (2010) Security enhanced routing protocol for ad hoc networks. J Convergence 1(1):43−47
Huang C, Cheng R, Chen S, Li C. Enhancing network availability by tolerance control in multi-sink wireless sensor networks. J Convergence 1(1):35–42
Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs. J Convergence 2(1):23–30
Xie B, Kumar A, Zhao D, Reddy R, He B. (2010) On secure communication in integrated heterogeneous wireless networks. Int J Inf Technol Commun Convergence 1(1):4−23
Chang J, Yang H, Chao H, Chen J (2010) Multipath design for 6LoWPAN ad hoc on-demand distance vector routing. Int J Inf Technol Commun Convergence 1(1):24−40
Yu W, Sun Y, Liu KJR (2005) HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM. pp 1252–1261
Eriksson J, Faloutsos M, Krishnamurthy S.V. (2007) Routing amid colluding attackers. IEEE international conference on network protocols. pp 184–193
Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. Acad Publ J Netw 3(5):13–20
Kim H, Chitti RB, Song J (2011) Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks. J inf Process Syst 7(1):137–150
Obaidat MS, Dhurandher SK, Diwakar K (2011) CASPER: Congestion aware selection of path with efficient routing in multimedia networks. J Inf Process Syst 7(2):241–260
Hu Y-C, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: The annual international conference on mobile computing and networking (MobiCom). pp 23–28
Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: ACM workshop on wireless security (WiSe03). pp 30–40
Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Depend Secure Comput 3(4):386–399
Fall K, Varadhan K, (eds) The Ns manual (formerly called “ns notes and documentation”). The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, June 2007. Available from http://www.isi.edu/nsnam/ns/
CMUMonarchGroup,CMUMonarchExtensions to theNS-2 Simulator 1998. Available from http://monarch.cs.cmu.edu/cmu-ns.html/
Acknowledgments
This work was supported in part by the National Science Council, Taiwan, under Contract NSC 99-2218-E-007- 012 and NSC 100-2628-E-007-018-MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, HM., Chen, CH., Yeh, CW. et al. A collaborative routing protocol against routing disruptions in MANETs. Pers Ubiquit Comput 17, 865–874 (2013). https://doi.org/10.1007/s00779-012-0537-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0537-y