Mobile Agent Based Routing in Manets - Attacks & Defences

A Mobile Adhoc Network (Manet) is a highly challenging environment due to its dynamic topology, limited processing capability, limited storage, band width constraints, high bit error rate and lack of central control. In this dynamic network, each node is considered as a mobile router. A malicious node can easily disrupt the proper functioning of the routing by refusing to forward routing message (misbehavior node), inject the wrong routing packets, modifying routing information, etc. Hence the design of secured routing algorithm is a major issue in Manets.  Mobile Agent based algorithms also called Ant Routing algorithms are a class of swarm intelligence and try to map the solution capability of ant colonies for routing in Manets. In this paper we discuss prominent attacks and propose counter-measures in three Ant based routing protocols that are proactive, reactive and hybrid routing.

[1]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[2]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[4]  Marco Dorigo,et al.  AntNet: Distributed Stigmergetic Control for Communications Networks , 1998, J. Artif. Intell. Res..

[5]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Tarek. M. Mahmoud,et al.  AntNet-RSLR: A proposed Ant routing protocol for MANETs , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).

[7]  Brijesh Bhatt,et al.  Comparison of different Ant Colony Based Routing Algorithms , 2010 .

[8]  Mikkel Bundgaard,et al.  Ant Routing System - a routing algorithm based on ant algorithms applied to a simulated network , 2002 .

[9]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[10]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[11]  Luca Maria Gambardella,et al.  AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks , 2005, Eur. Trans. Telecommun..

[12]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..