Abstract
In this manuscript we deal with securing routing protocol of mobileadhoc network against Non forwarding nodes which originate selfish or passive attack .due to its unique feature of open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Further most of the mobile adhoc routing protocols assume that nodes are trust worthy and cooperative this renders them vulnerable to various types of attacks. In this scheme the nodes which originate the passive or selfish attacks are identified and isolated from the routing and data forwarding function. We considered DSR protocol in NS-2 for our simulation. The results obtained illustrates that the proposed scheme outscores the traditional DSR in all metrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sun, B., Young, L.O.: Intrusion detecti on techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 56–63 (2007)
Murthy, S., Garcia-Luna-Aceves, J.J.: An effi cient routing protocol for wireless networks. ACM Mobile Networks Appl., 183–197 (1996)
Djenouri, D., Badache, N.: New power- aware routing protocol for mobile adhoc network. International Journal of Adhoc Ubiquitous Computing, 126–136 (2006)
Buchegger, S., Boudec, J.-Y.: The sel fish node: Increasing routing security for mobile adhoc networks. LCA-Report-2001-008
Chen, K., Nahrstedt, K.: IPass: An incentive compatible auction scheme to enable packet forwarding service in MANET. In: Proceeding of the 24th International Conference on Distributed Computing System, Tokyo, pp. 534–542 (2004)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Adhoc wireless networking. Mobile Computing 353, 153–181 (1996)
Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, DSR (2002) (Internet Draft)
Perkins, C.E., Royer, E.M., Das, S.: Adhoc On-demand Distance Vector (AODV) Routing. RFC 3561 (2003)
Murphy, S.: Routing Protocol Threat Analysis. Internet Draft (2002)
Zhang, K.: Efficient Protocols for Signing Routing Messages. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS 1998), SanDiego, CA, pp. 29–35 (1998)
Kong, J.: Adaptive Security for Multi-layer Ad Hoc Networks. In: Special Issue of Wireless Communications and Mobile Computing. John Wiley Interscience Press, Chichester (2002)
Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J., LeBoudec, J.: Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine 39(6), 166–174 (2001)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. 6th Annual Int. Conf. on Mobile computing and Networking (MobiCom 2000), Boston, MA, pp. 255–265 (2000)
Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. Cooperation of Nodes - Fairness in Dynamic Ad-hoc Networks. Technical Report (IC/2002/01), EPFL I&C, Lausanne (2002)
Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile ad Hocnetworking & Computing, Lausanne, Switzerland, pp. 226–236 (2002)
Buchegger, S., Boudec, J.-Y.L.: Nodes Bearing Grudges towards Routing Security, Fairness and robustness in Mobile ad hoc networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network–Based Processing, pp. 403–410 (2002)
Dawkins, R.: The selfish Gene, 1980th edn. Oxford University Press, Oxford
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks. In: Proceedings of 7th International Workshop on Security Protocols, Cambridge, UK, pp. 172–194 (1999)
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine, Special Issue on Networking Security 13(6), 24–30 (1999)
Hubaux, J., Buttyan, L., Capkun, S.: The quest for security in Mobile Ad hoc Networks. In: Proceedings of the ACM Symposium on Mobile Ad hoc Networking and Computing, MobiHOC (2001)
Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks. In: Proceedings of the 2nd ACM Workshop on Wireless Security, San Diego, CA, USA, pp. 41–50 (2003)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand Routing protocol for ad hoc networks. In: Proceedings of 8th ACM International Conference on Mobile Computing and Networking (2002)
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In: Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3–13 (2002)
Dahill, Levine, Royer, Shields: A Secure routing protocol for adhoc networks. In: Proceedings of the International Conference on Network Protocols (ICNP), pp. 78–87 (2002)
Fall, K., Varadhan, K.: The ns manual, http://www.isi.edu/nsnam/ns/doc/index.html
Broch, J., Johnson, D., Maltz, D., Hu, Y., Jetcheva, J.: A Performance Comparison of Multihop Wireless Ad Hoc Networking Protocols. In: Proceedings of 4th ACM/IEEE International Conference on Mobile Computing and Networking (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhalaji, N., Shanmugam, A. (2010). A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)