Scenario based evaluation of the impact of misbehaving nodes in Mobile Ad hoc Networks

Mobile Ad hoc Networks (MANETs) is a collection of self organized mobile nodes that can communicate with each other without the need of pre-deployed infrastructure. Each mobile node acts as a router and forward packets for the other nodes in order to achieve the multi-hop communication between the nodes. A mobile node misbehave (selfish) due to its scarcely available resources and decide not to forward the packets on behalf of other nodes in the network but it expects other nodes to forward its own traffic. In this paper, the impact of such misbehaving nodes are analyzed and evaluated using Dynamic Source Routing as a routing protocol under different mobility scenario. The network performance is evaluated in terms of global throughput and normalized routing load where a defined percentage of nodes behave selfishly. The simulation study shows that the group mobility scenario performs better with the presence of selfish nodes than entity mobility scenario and the impact of selfishness is a major threat for MANETs.

[1]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[2]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[3]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[4]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[5]  Pietro Michiardi,et al.  Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .

[6]  Zygmunt J. Haas,et al.  Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[7]  Xiaoyan Hong,et al.  A wireless hierarchical routing protocol with group mobility , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[8]  Marco Conti,et al.  Multihop Ad Hoc Networking: The Reality , 2007, IEEE Communications Magazine.

[9]  Marco Conti,et al.  Multihop Ad Hoc Networking: The Theory , 2007, IEEE Communications Magazine.

[10]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[13]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[14]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..