Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks

In multi-hop wireless ad hoc networks, the packets are forwarded through intermediate nodes along the source-destination path. Without having any control on packets forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. The dropper motivation is the preservation of its resources, like its limited energy (selfish behavior) or the launch of denial of service attack (malicious behavior). In this paper, we propose an approach to verify the correct forwarding of packets by an intermediate node. The Merkle tree principle has been used for implementation in justification of our proposed approach. Through simulation, we have shown our approach efficiency, and we have evaluated its performance in both proactive and reactive routing protocol in ad hoc network. Also, we have compared our approach with the watchdog and the 2-hop ACK which are well-known approaches in the literature.

[1]  JianHua Song,et al.  A reputation-based scheme against malicious packet dropping for mobile ad hoc networks , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[2]  Djamel Djenouri,et al.  Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks , 2006, IWSOS/EuroNGI.

[3]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[4]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[5]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[7]  Michael Schneider,et al.  Merkle Tree Traversal Revisited , 2008, PQCrypto.

[8]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[9]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  S. Sharma,et al.  Simulation Study Of Blackhole Attack in the Mobile Ad hoc Networks ” , 2008 .

[12]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[13]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[14]  Djamel Djenouri,et al.  On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.

[15]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[16]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[17]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[18]  Jamal N. Al-Karaki,et al.  Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..

[19]  Evangelos Kranakis,et al.  Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.

[20]  Jung-Shian Li,et al.  Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..

[21]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[22]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[23]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[24]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[25]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[26]  Soufiene Djahel,et al.  An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.