skip to main content
10.1145/1967486.1967522acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Detecting misbehaving nodes in MANETs

Published: 08 November 2010 Publication History

Abstract

There has been a tremendous growth in the use of wireless communication in the past few decades. Mobile Ad hoc NETwork (MANET) is one of the most important one among various wireless communication mechanisms. In MANET, each node in a network performs as both a transmitter and a receiver. They rely on each other to store and forward packets. Its unique infrastructureless network and self-configuring capability makes it ideal for many mission critical applications, including military use and remote exploration. However, these characteristics also make MANET vulnerable to passive and active attacks due to its open medium, changing topology and lack of centralized monitoring. To address the new security challenges, Intrusion Detection System (IDS) is required to detect the malicious attackers before they can accomplish any significant damages to the network. Many existing IDSs for MANETs are based upon Watchdog mechanism. In this paper, we propose a new IDS called Enhanced Adaptive ACKnowledgement (EAACK) that solves four significant problems of Watchdog mechanism, which are ambiguous collisions, receiver collisions, limited transmission power and false misbehavior report. We use Network Simulator 2 to simulate the proposed mechanism and compare the results with existing mechanisms.

References

[1]
Buchegger, S. and Le Boudec, J-Y. 2002. Performance analysis of the CONFIDANT protocol: Cooperation of nodes, fairness in dynamic ad-hoc networks. In Proceedings of MobiHoc'02.
[2]
Buttyan, L. and Hubaux, J-P. 2000. Enforcing service availability in mobile ad-hoc WANs. In Proceedings of the 1st ACM international Symposium on Mobile Ad Hoc Networking & Computing (Boston, Massachusetts). International Symposium on Mobile Ad Hoc Networking & Computing. IEEE Press, Piscataway, NJ, 87--96.
[3]
Buttyan, L. and Hubaux, J-P. 2007. Security and cooperation in wireless networks. Cambridge University Press (Aug. 2007)
[4]
Feeney, L. M. and Nilsson, M. 2001. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In IEEE INFOCOM, 2001. 1548--1557 vol. 3
[5]
Hu, Y-C., Perrig, A., Johnson, D.: Ariadne. 2002. A secure on-demand routing protocol for ad-hoc networks. In Proceedings of the 8th ACM international Conference on Mobile Computing and Networking (Atlanta, GA). MobiCom'02. Modeling and Simulation Design. AK Peters Ltd., Natick, MA.
[6]
Hu, Y-C., Johnson, D. B. and Perrig, A. 2002. SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications. Pp. 3--13
[7]
Hubaux, J-P., Gross, T., Boudec, Le and Vetterli, M. 2001. Toward self-organized mobile ad hoc networks: The terminodes project. In IEEE Communications Magazine.
[8]
Jakobsson, M., Hubaux, J-P. and Buttyan, L. 2003. A micropayment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Crypto, Jan 2003.
[9]
Jayakumar, G and Gopinath, G. 2007. Ad Hoc Mobile Wireless Networks Routing Protocol -- A Review. In Journal of Computer Science 3(8): 574--582.
[10]
Johnson, D. B., Broch, J., Hu, Y-C., Jetcheva, J. and Maltz, D. A. 1998. The CMU monarch project's extensions to NS. In Proceedings of the 42nd Internet Eng. Taskforce.
[11]
Johnson, D-B. and Maltz, D-A. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile Computing. Editer by Toasz Imielinski and Hank Korth, chapter 5, 153--181. Kluwer Academic Publishers. 1996
[12]
Liu, K., Deng, J., Varshney, P. K., and Balakrishnan, K. 2007. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transactions on Mobile Computing 6, 5 (May. 2007), 536--550. DOI= http://dx.doi.org/10.1109/TMC.2007.1036
[13]
Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (Boston, Massachusetts, United States, August 06--11, 2000). MobiCom '00. ACM, New York, NY, 255--265. DOI= http://doi.acm.org/10.1145/345910.345955
[14]
Murthy, S. and Garcia-Luna-Aceves, J. J. 1996. An efficient routing protocol for wireless networks. Mob. Netw. Appl. 1, 2 (Oct. 1996), 183--197. DOI= http://dx.doi.org/10.1007/BF01193336
[15]
Nasser, N and Chen, Y. 2007. Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network. In Proceedings of IEEE International Conference on Communication. (Glasgow, Scotland, June 24--28, 2007). ICC '07.
[16]
Parker, J., Undercoffer, J., Pinkston, J. and Joshi, A. 2002. Secure routing for mobile ad-hoc networks. In Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. (Texas, SA, 2002). CNDS'02.
[17]
Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. SIGCOMM Comput. Commun. Rev. 24, 4 (Oct. 1994), 234--244. DOI= http://doi.acm.org/10.1145/190809.190336
[18]
Sanzgiri, K., Dahill, B., Levine, B-N., Shields, C. and Belding-Royer, E-M. 1999. A review of current routing protocols for ad-hoc mobile wireless networks. Personal Communications Magazine, April 1999.
[19]
Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. 2009. Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. International Journal of Multimedia Systems, Springer, vol. 15, issue 5, 273--282.
[20]
Sun, B. 2004. Intrusion Detection in Mobile Ad Hoc Networks. Doctoral Dissertation. Texas A&M University.
[21]
Wu, B., Chen, J., Wu, J. and Cardei, M. 2006. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Xiao, Y., Shen, X. and Du, -Z, D. Net.
[22]
Zhou, L. and Haas, Z. 1999. Securing ad-hoc networks. In IEEE Network Magazine. 13(6), 24--30
[23]
Zhong, S., Chen, J. and Yang, Y. R. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of Infocom'03, San Francisco, CA, USA, March 30- April 2003.

Cited By

View all
  • (2022)Intrusion Detection in Manet Through Machine Learning ApproachInternational Journal of Innovative Technology and Exploring Engineering10.35940/ijitee.C9679.011132211:3(1-6)Online publication date: 30-Jan-2022
  • (2022)Maintaining Effective Node Chain Connectivity in the Network with Transmission Power of Self-Arranged AdHoc Routing in Cluster ScenarioElectronics10.3390/electronics1115245511:15(2455)Online publication date: 6-Aug-2022
  • (2021)Malicious node detection based on clustering techniques in networkMaterials Today: Proceedings10.1016/j.matpr.2021.05.11147(6676-6678)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Detecting misbehaving nodes in MANETs
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Information & Contributors

              Information

              Published In

              cover image ACM Other conferences
              iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
              November 2010
              895 pages
              ISBN:9781450304214
              DOI:10.1145/1967486
              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Sponsors

              • IIWAS: International Organization for Information Integration
              • Web-b: Web-b

              In-Cooperation

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              Published: 08 November 2010

              Permissions

              Request permissions for this article.

              Check for updates

              Author Tags

              1. AACK
              2. EAACK
              3. MANET
              4. TWOACK
              5. Watchdog
              6. intrusion detection system

              Qualifiers

              • Research-article

              Conference

              iiWAS '10
              Sponsor:
              • IIWAS
              • Web-b

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)2
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 13 Feb 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2022)Intrusion Detection in Manet Through Machine Learning ApproachInternational Journal of Innovative Technology and Exploring Engineering10.35940/ijitee.C9679.011132211:3(1-6)Online publication date: 30-Jan-2022
              • (2022)Maintaining Effective Node Chain Connectivity in the Network with Transmission Power of Self-Arranged AdHoc Routing in Cluster ScenarioElectronics10.3390/electronics1115245511:15(2455)Online publication date: 6-Aug-2022
              • (2021)Malicious node detection based on clustering techniques in networkMaterials Today: Proceedings10.1016/j.matpr.2021.05.11147(6676-6678)Online publication date: 2021
              • (2021)Load Based Key Generation for MANETs: A Comparative Study with DSR and AODVWireless Personal Communications: An International Journal10.1007/s11277-020-07757-6116:3(1703-1712)Online publication date: 1-Feb-2021
              • (2020)Managing & Detecting Fishy Nodes in MANET using Cloud Concepts2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT)10.1109/ICSSIT48917.2020.9214093(166-169)Online publication date: Aug-2020
              • (2020)Secure Data Transmission in Mobile Networks Using Modified S-ACK MechanismIntelligent Computing and Applications10.1007/978-981-15-5566-4_64(721-730)Online publication date: 30-Sep-2020
              • (2019)Identification and Prevention of Joint Gray Hole and Black Hole AttacksInternational Journal of Ambient Computing and Intelligence10.4018/IJACI.201904010610:2(80-90)Online publication date: 1-Apr-2019
              • (2019)Modified Cluster Based Certificate Blocking of Misbehaving Node In Manets2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)10.1109/ICATIECE45860.2019.9063622(155-161)Online publication date: Mar-2019
              • (2019)Acknowledgment scheme using cloud for node networks with energy-aware hybrid scheduling strategyJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-019-01629-z11:10(3947-3962)Online publication date: 18-Dec-2019
              • (2018)Reduction of Malicious Nodes using RRT and Clustering in Mobile Ad hoc NetworkInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT183839(133-142)Online publication date: 16-Nov-2018
              • Show More Cited By

              View Options

              Login options

              View options

              PDF

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media