Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks

A Mobile ad-hoc network (MANET) is a wireless network, self-configuring, capable of self-directed operation, hastily deployable and operates without infrastructure. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. A node may be unsuccessful to cooperate during routing, sometimes may even disturb the routing transaction. The Qos parameters like PDR, throughput and delay are affected directly due to such behavior of nodes and it is termed as misbehaving nodes. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a trust based reliable AODV protocol is presented which implements a trust value for each node. Every node is defined as reliable node if its trust value is greater than threshold value, if not it’s a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with normal AODV, if there are misbehaving nodes in the MANET.

[1]  Jamalul-lail Ab Manan,et al.  Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment , 2009, 2009 Fourth International Conference on Digital Information Management.

[2]  Mohammad Atique,et al.  Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network , 2010, 2010 Sixth International conference on Wireless Communication and Sensor Networks.

[3]  Asmidar Abu Bakar,et al.  Forming Trust in Mobile Ad Hoc Network , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[4]  Gerd Kortuem,et al.  When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[5]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Yih-Chun Hu,et al.  Enabling secure high-performance wireless ad hoc networking , 2003 .

[7]  A. Pushpa Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[8]  J.I. Agbinya,et al.  Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[9]  S. P. Koh,et al.  A routing protocol based on trusted and shortest path selection for mobile ad hoc network , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).