Skip to main content

Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks

  • Conference paper
  • 1360 Accesses

Abstract

A Mobile ad-hoc network (MANET) is a wireless network, self-configuring, capable of self-directed operation, hastily deployable and operates without infrastructure. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. A node may be unsuccessful to cooperate during routing, sometimes may even disturb the routing transaction. The Qos parameters like PDR, throughput and delay are affected directly due to such behavior of nodes and it is termed as misbehaving nodes. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a trust based reliable AODV protocol is presented which implements a trust value for each node. Every node is defined as reliable node if its trust value is greater than threshold value, if not it’s a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with normal AODV, if there are misbehaving nodes in the MANET.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kortuem, G., Schneider, J., Preuitt, D., Thompson, T.G.C., F’ickas, S., Segall, Z.: When Peer to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks. In: 1st International Conference on Peer-to-Peer Computing, Linkoping, Sweden, pp. 75–91 (August 2001)

    Google Scholar 

  2. Perkins, C., Royer, E., Das, S.: Ad hoc on-demand Distance Vector Routing, RFC-3651

    Google Scholar 

  3. Hu, Y.: Enabling Secure High-Performance Wireless Ad Hoc Networking, PhD Thesis, Carnegie Mellon University, CMU (2003)

    Google Scholar 

  4. IIyas, M.: The Handbook of Wireless Ad Hoc Network, CRC (2003)

    Google Scholar 

  5. Jassim, H.S., Yussof, S.: A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network. In: IEEE 9th Malaysia International Conference on Communications (2009)

    Google Scholar 

  6. Umuhoza, D., Agbinya, J.I.: Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (2007)

    Google Scholar 

  7. Abu Bakar, A., Ismail, R., Jais, J.: Forming Trust in Mobile Ad -Hoc Network. In: 2009 International Conference on Communications and Mobile Computing (2009)

    Google Scholar 

  8. Mangrulkar, R.S., Atique, M.: Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile Adhoc Network (2010)

    Google Scholar 

  9. Menaka, A., Pushpa, M.E.: Trust Based Secure Routing in AODV Routing Protocol (2009)

    Google Scholar 

  10. TAODV: A Trusted AODV Routing protocol for Mobile ad hoc networks (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Sridhar, S., Baskaran, R. (2012). Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27308-7_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27307-0

  • Online ISBN: 978-3-642-27308-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics