CFP last date
20 May 2024
Reseach Article

Detection of Packet Dropping Nodes in MANET using DSR Routing Protocol

by Anshu Chauhan, D.K. Gupta, Manoj Kumar Sah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 7
Year of Publication: 2015
Authors: Anshu Chauhan, D.K. Gupta, Manoj Kumar Sah
10.5120/ijca2015905385

Anshu Chauhan, D.K. Gupta, Manoj Kumar Sah . Detection of Packet Dropping Nodes in MANET using DSR Routing Protocol. International Journal of Computer Applications. 123, 7 ( August 2015), 10-16. DOI=10.5120/ijca2015905385

@article{ 10.5120/ijca2015905385,
author = { Anshu Chauhan, D.K. Gupta, Manoj Kumar Sah },
title = { Detection of Packet Dropping Nodes in MANET using DSR Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 7 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number7/21970-2015905385/ },
doi = { 10.5120/ijca2015905385 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:01.414709+05:30
%A Anshu Chauhan
%A D.K. Gupta
%A Manoj Kumar Sah
%T Detection of Packet Dropping Nodes in MANET using DSR Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 7
%P 10-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless network is a growing technology that facilitates users for sharing of information instantly through wireless electronic devices irrespective of their locations. It can be infrastructure based or infrastructure less (ad hoc networks). An ad hoc network gains more attention because of its convenience, mobility, scalability, cost and easy setup. It is best suitable for applications, where predefined infrastructure is not possible. But ad hoc network is vulnerable to various attacks due to its functionality and deployment scenario. It is a decentralized networks therefore all the routing activities are handled by nodes. Nodes may behave badly in the network and can drop the packets instead of forwarding them. The aim of this research work is to detect these packet dropping nodes in MANET and prevents these packet droppers to be chosen as an active element of the path used for packet forwarding in DSR (Dynamic Source Routing) protocol. For this, we have implemented a trust and cluster based monitoring technique and simulated this environment using network simulator NS2.

References
  1. Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker, “Mitigation routing misbehavior in mobile ad hoc networks”, ACM, proceedings of 6th annual international conference on Mobile computing and Networking, pages: 255-265, (2000).
  2. David B. Johnson, David A. Maltz, Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, Carnegie Mellon University, Pittsburgh, (2001).
  3. Prasant Mohapatra, Srikanth V. Krishnamurthy, “AD HOC NETWORKS: Technologies and Protocols”, Springer Science and Business Media, USA, (2005).
  4. Sevil Sen, John A. Clark, Juan E. Tapiador, “Security Threads in Mobile Ad Hoc Networks”, University of York, U.K, (2010).
  5. Kejun Liu, Jing Deng, P. K. Varshney, K. Balakrishnan, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transaction on Mobile Computing, Vol: 6, Issue: 5, (2007).
  6. Feng Li, Yinying Yang, Jie Wu, “Attack and Flee: Game-Theory-Based Analysis on Interactions among Nodes in MANETs”, IEEE Transactions on Systems, Man and Cybernetics, Vol: 40, No: 3, (2010).
  7. Ahmed M. Abdalla, Imane A. Saroit, Amira Kotb, Ali H. Afsari, “Misbehavior Nodes Detection and Isolation for MANETs OLSR Protocol”, Science Direct: World Conference on Information Technology, pages: 115-121, (2011).
  8. Praveen Joshi, “Security issues in routing protocols in MANETs at network layer”, Science Direct: World Conference on Information Technology, pages: 954-960, (2011).
  9. E. Hernandez-Orallo, M. D. Serrat, J. C. Cano, C.T. Calafate, P. Manzoni, “Improving Selfish node detection in MANETs Using a Collaborative Watchdog”, IEEE Communication Letters, Vol: 16, Issue: 5, (2012).
  10. Terrawat Issariyakul, Ekram Hossain, “Introduction to Network Simulation NS2” Second Edition Springer Science and Business Media, USA, (2012).
  11. A. M. Kurkure, B. Chaudhari, “Analysing Credit based ARAN to detect selfish node in MANET”. IEEE International Conference on Advances in Engineering and Technology Research (ICAETR), ( 2014).
  12. T. Evanjalin, “Detection of Selfish Users and Prevent Using Game Theory in CRAHNs”, International Conference on Simulations in Computing Nexus (ICSCN), Coimbatore, (2014).
  13. Enrique Hernandez-Orallo, Manuel D. Serrat, Juaun-Cano, Carlos T. Calafate, Pietro Manzoni, “CoCoWa: A Collaborative Contact-based Watchdog for Detecting Selfish Nodes”, IEEE Transactions on Mobile Computing, Vol: 14, Issue: 6, (2015).
Index Terms

Computer Science
Information Sciences

Keywords

MANET Vulnerable Packet dropper Wormhole Man-in-middle attack Spoofing.