Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS

A mobile ad hoc network is a self-created, selforganized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. In this paper we propose a solution of triple umpiring system (TUS) that provides security for routing and data forwarding operations. In our system each node’s behaviour from source to destination is closely monitored by a set of three umpires. If any misbehavior is noticed umpires flag off the guilty node from the circuit. We have proposed two enhancements to the basic TUS for salvaging, the circuit during disruptions in route reply and data forwarding phases. The model with these two enhancements is called ETUS. We have implemented TUS and ETUS by modifying the popular AODV protocol. Extensive simulation studies using QualNet 5.0 establish the soundness of the proposal.

[1]  Imrich Chlamtac,et al.  A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.

[2]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[3]  Ayyaswamy Kathirvel,et al.  A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .

[4]  Rengaramanujam Srinivasan,et al.  Enchanced Self Umpiring System for Security Using Salvaging Route Reply , 2010 .

[5]  Rengaramanujam Srinivasan,et al.  Self _ USS : A Self Umpiring System for Security in Mobile Ad hoc Network , 2022 .

[6]  Sung-Ju Lee,et al.  AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[7]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[10]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[11]  A. Kathirvel,et al.  Global Mobile Information System Simulator in Fedora Linux , 2009 .

[12]  Samir Ranjan Das,et al.  Query Localization Techniques for On-Demand Routing Protocols in Ad Hoc Networks , 1999, Wirel. Networks.

[13]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Jalel Ben-Othman,et al.  Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[15]  Liu Dan,et al.  A Novel Cryptography for Ad Hoc Network Security , 2006, 2006 International Conference on Communications, Circuits and Systems.

[16]  Lei Feng-Yu,et al.  Ad Hoc Networks Security Mechanism Based on CPK , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[17]  Rengaramanujam Srinivasan,et al.  A System of Umpires for Security of Wireless Mobile Ad Hoc Network , 2010, Int. Arab. J. e Technol..

[18]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[19]  M. Hauspie,et al.  Enhancing nodes cooperation in ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[20]  Magdy S. El-Soudani,et al.  Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[21]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[22]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[23]  Mukesh Singhal,et al.  Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks , 2005, MSWiM '05.

[24]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[25]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[26]  Elizabeth M. Belding-Royer,et al.  Dynamically Adaptive Multipath Routing based on AODV , 2004 .