CFP last date
20 May 2024
Reseach Article

Routing Misbehavior in Ad Hoc Network

by Moitreyee Dasgupta, S. Choudhury, N. Chaki
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 18
Year of Publication: 2010
Authors: Moitreyee Dasgupta, S. Choudhury, N. Chaki
10.5120/376-561

Moitreyee Dasgupta, S. Choudhury, N. Chaki . Routing Misbehavior in Ad Hoc Network. International Journal of Computer Applications. 1, 18 ( February 2010), 89-92. DOI=10.5120/376-561

@article{ 10.5120/376-561,
author = { Moitreyee Dasgupta, S. Choudhury, N. Chaki },
title = { Routing Misbehavior in Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 18 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 89-92 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number18/376-561/ },
doi = { 10.5120/376-561 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:43:08.124093+05:30
%A Moitreyee Dasgupta
%A S. Choudhury
%A N. Chaki
%T Routing Misbehavior in Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 18
%P 89-92
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial-of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC layer protocol in the presence of selfish or compromised nodes. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. However, little work has been done on quantifying the impact of these misbehaviors on the performance of ad hoc routing protocols. In this paper, we focus on the impact of rushing attack implemented by malicious nodes (MNs) on AODV routing protocol as an extension of our previous work. The Simulation study shows that the claim of our previous work stands true that AODV protocol fails completely in presence of rushing attack.

References
  1. Y. C. Hu, A. Perrig and D. B. Johnson “Rushing Attacks and Defense in Wireless Ad Hoc Networks Routing Protocol”; Proceedings of ACM WiSe2003, Sep, 2003.
  2. Hoang Lan Nguyen and Uyen Trang Nguyen “Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks”, Proceedings of the International Conference of Networking, International Conference on Systems and International Conference on Mobile Communication and Learning Technologies.
  3. Tamilselvan, L. Sankaranarayanan, V. “Prevention of Blackhole Attack in MANET”, Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 2007. (AusWireless 2007).
  4. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Packet Lashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks” Proc. of the 22nd Conf. of the IEEE Computer and Communication Societies (INFOCOM), 2003.
  5. H. Yang, H Y. Luo, F Ye, S W. Lu and L Zhang “Security in mobile ad hoc networks: Challenges and solutions” Proceedings of IEEE Wireless Communications, pp 38-47, 2004.
  6. C. Perkings, E. Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys and Apps, 1999.
  7. D. B. Johnson, D. A. Maltz and Yih-Chun Hu available at: http://tools.ietf.org/html/draft-ietf-manet-dsr-10
  8. “The network simulator - ns2,” http://www.isi.edu/nsnam/ns/.
  9. M. G. Zapata “Secure Ad hoc On-Demand Distance Vector (SAODV) Routing” Available at - http://personals.ac.upc.edu/guerrero/papers/draftguerrero-manet-saodv-06.txt
  10. M.Raja, J. P. Hubaux, I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots” ACM MobiSys 2004, June 2004, Boston, USA.
  11. Rahman,, A. A., Hailes, “A distributed trust Model”(1997), Proceedings of the ACM New Security Paradigms Workshop, pp. 48-60, 1997.
  12. M. Dasgupta, S. Choudhury and N. Chaki, “Secure Hypercube based team multicast routing protocol (S-HTMRP)”, Proceedings of First IEEE International Advanced Computing Conference (IACC’09), March 2009.
  13. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E. M. Belding-Royer “A Secure Routing Protocol for Ad Hoc Networks (ARAN)”
  14. Yih-Chun Hu, Adrian Perrig, David B. Johnson. “Ariadne: A secure On-Demand routing protocol for Ad hoc networks”; Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 12-23, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Security Attacks in ad hoc routing Rushing Attack DoS attacks MANET