CFP last date
22 April 2024
Reseach Article

An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

by Shirina Samreen, G. Narasimha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 17
Year of Publication: 2013
Authors: Shirina Samreen, G. Narasimha
10.5120/12066-8191

Shirina Samreen, G. Narasimha . An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET. International Journal of Computer Applications. 69, 17 ( May 2013), 36-42. DOI=10.5120/12066-8191

@article{ 10.5120/12066-8191,
author = { Shirina Samreen, G. Narasimha },
title = { An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 17 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number17/12066-8191/ },
doi = { 10.5120/12066-8191 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:33.317790+05:30
%A Shirina Samreen
%A G. Narasimha
%T An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 17
%P 36-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication in a Mobile ad hoc network is accomplished in a multi-hop fashion wherein the nodes themselves act as routers as well as source. MANET is vulnerable to a variety of insider as well as outsider attacks because of it's inherent characteristics like dynamically changing topology, limited power and no centralized authority to monitor the behaviour of the nodes . Most of the secure routing protocols focus on the control plane attacks targeting the different elements of the routing protocol but data plane attacks are more difficult to handle for which we need to ensure secure data forwarding since certain adversarial nodes may launch a number of attacks on the data transmission by simply dropping the packets without forwarding them. The current paper is an extension to our earlier work where we addressed one of the most difficult data plane attacks namely, the packet dropping attack. In our earlier work, we had proposed a secure hybrid routing protocol which combats the packet dropping attack carried on by an individual / colluding adversaries and elaborated upon the first two phases of Secure Least Cost route establishment and Detection of individual node / colluding nodes maliciously dropping packets. Once a node has been identified as an adversary, we need to work upon the remedial action to prevent the future routes from involving adversarial nodes. In the current paper, we elaborate upon the last two phases namely: Punishing the adversarial nodes upon misbehaviour detection and Propagation of information about node misbehaviour and good behaviour. The current paper extends our earlier work by considering an additional colluding adversarial model consisting of consecutive nodes on the route from source to destination acting as colluding adversaries. Finally the protocol results in the establishment of a route including those nodes with good packet forwarding behaviour.

References
  1. Haas Z. J. , Pearlman M. R. , and Samar P. , "The Zone Routing Protocol (ZRP)", IETF Internet Draft, draft-ietf-manet-zone-zrp-04. txt, July 2002.
  2. Jan Schaumann, "Analysis of Zone Routing Protocol", Course CS765, Stevens Institute of Technology Hoboken, New Jersey, USA, 8th December 2002
  3. Sanzgiri, Dahill, Levine, Shields and Belding-Royer, "A secure routing protocol for ad hoc networks," In Proceedings of IEEE International Conference on Network Protocols (ICNP). 2002.
  4. Hu, Y. , Johnson, and Perrig, "SEAD: Secure Efficient Distance Vector Routing For Mobile Wireless Ad Hoc Networks," In Proceedings Of IEEE Workshop On Mobile Computing Systems And Applications (WMCSA). 2002
  5. Hu Y. , Perrig, and Johnson, "Ariadne: A Secure On-Demand Routing Protocol For Ad Hoc Networks," In Proceedings Of ACM Annual International Conference Of Mobile Computing (MOBICOM).
  6. Perkins, C. E. And Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) For Mobile Computers," In Proceedings Of SIGCOMM Conference On Applications, Technologies, Architectures, And Protocols For Computer Communication (SIGCOMM). 1994
  7. Johnson, Maltz, And Broch, "DSR: The Dynamic Source Routing Protocol For Multi-Hop Wireless Ad Hoc Networks. " In Ad Hoc Networking. Addison-Wesley, Chapter 5, 139–172.
  8. Perrig, Canetti, Song, And Tygar, "Efficient And Secure Source Authentication For Multicast," In Proceedings Of ISOC Symposium Of Network And Distributed Systems Security (NDSS).
  9. L. Buttyán, and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Net works and Applications, 8(5), pp. 579-592, 2003.
  10. M. Jakobsson, J. -P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Financial Crypto, 2003.
  11. S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks," in IEEE INFOCOM, pp. 1987-1997, 2003.
  12. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM), pp. 255-265, 2000.
  13. S. Buchegger and J. -Y. L. Boudec, "Self-policing mobile ad-hoc networks by reputation systems," IEEE communications Magazine, pp. 101-107, 2005.
  14. P. Michiardi, and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of IFIP Joint Working Conference on Communications and Multimedia Security, pp. 107-121, 2002.
  15. K. Liu, J. Deng, P. Varshney, K. Balakrishnan, "An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, 6(5), pp. 536550, 2007.
  16. V. Padmanabhan, D. Simon, "Secure traceroute to detect faulty or malicious routing," ACM SIGCOMM Computer Communication Review, 33(1), pp. 77-82, 2003.
  17. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks," ACM Trans. Inf. Syst. Secur. 10(4), 1-35, 2008.
  18. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "Intrazone Routing Protocol (IARP)", IETF Internet Draft, draft-ietf-manet-iarp-01. txt, June 2001
  19. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "Interzone Routing Protocol (IERP)", IETF Internet Draft, draft-ietf-manet-ierp-01. txt, June 2001.
  20. Haas, Zygmunt J. , Pearlman, Marc R. , Samar, P. : "The Bordercast Resolution Protocol (BRP) for Ad Hoc Networks", IETF Internet Draft, draft-ietf-manet-brp01. txt, June 2001
  21. Shirina Samreen and Dr. G. Narasimha, "A secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET," International Journal of Computer Applications (IJCA) Vol. 65-No. 10, March 2013, ISSN: 0975-8887
  22. Shirina Samreen and Dr. G. Narasimha, "Detection of Colluding Adversaries in a Packet Drop Attack on MANET," International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9, November- 2012 ISSN:2278-0181
Index Terms

Computer Science
Information Sciences

Keywords

Colluding adversaries Packet Drop Attack Bloom filters Secure Hybrid Routing Protocol