A novel acknowledgment-based approach against collude attacks in MANET

Routing misbehavior and collusion attack in Mobile Ad Hoc Networks (MANETs) are the main topics in this paper. Various techniques prevent routing misbehaviors have been published, but most of them do not consider the collusion attacks. Therefore, we propose the scheme called NACK to simultaneously detect routing misbehavior and collusion attacks, and to mitigate the effects of routing attacks. Furthermore, NACK scheme adopts an acknowledgment-based approach and timestamps comparison to resist the attacks mentioned above. The security analysis and simulation results are presented to evaluate the performance of NACK.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[4]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[5]  Chien-Hung Liu,et al.  A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm , 2007, Expert Syst. Appl..

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[8]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[9]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[11]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[12]  Ting-Wei Hou,et al.  Adaptive two-way uniform partition for multicast routing problem with separate paths in ad hoc networks , 2009, Expert Syst. Appl..

[13]  Xiang-Yang Li,et al.  Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[14]  Yanbin Liu,et al.  Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[15]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[16]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[17]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[18]  Yanbing Liu,et al.  MOEAQ: A QoS-Aware Multicast Routing algorithm for MANET , 2010, Expert Syst. Appl..

[19]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[21]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..