On Securing MANET Routing Protocol Against Control Packet Dropping

In this manuscript we deal with securing routing protocols of mobile ad hoc networks (MANETs) against packet dropping misbehavior. More specifically, we propose a solution to protect control packets of reactive source routing protocols against. Most current proposals focus on data packets. Nonetheless, dropping control packets may be beneficial for selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfish node could exclude itself from routes and thereby avoid receiving data packets to forward. Similarly, a malicious could drop RERR (Route Error) packets to keep the use of failed routes, potentially resulting in a denial of service. Our solution could be intergraded with any source routing protocol. For the implementation in this work, we have chosen one of the most secure protocols, namely ENDAIRA. We assess our solution by an extensive simulation study.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Djamel Djenouri,et al.  New power-aware routing protocol for mobile ad hoc networks , 2006, Int. J. Ad Hoc Ubiquitous Comput..

[3]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Levente Buttyán,et al.  Towards provable security for ad hoc routing protocols , 2004, SASN '04.

[6]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[7]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[9]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[10]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[11]  Djamel Djenouri,et al.  Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks , 2005, IPOM.

[12]  Timothy X. Brown,et al.  Minimum Energy Routing Schemes for a Wireless Ad Hoc Network , 2002 .

[13]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[14]  M. Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).

[15]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[16]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[17]  D. Djenouri,et al.  A novel approach for sel sh nodes detection in MANETs: proposal and Petri nets based modeling , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[18]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[19]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[20]  Levente Buttyán,et al.  Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[21]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..