Abstract
Wireless mesh network (WMN) is a wireless ad hoc network which uses mesh topology to connect the radio nodes together and it is prone to vulnerabilities due to its open architecture. Packet loss is the major issue due to its open wireless physical media, frequent topological changes, scalability and power constraints. In general, packet drops in WMN during transmission may happen due to mobility or buffer overflow or power depletion or malicious behavior of the intermediate nodes which degrades the performance of WMN. This paper proposes an adaptive dynamic source routing protocol (ADSR) to detect the misbehaving node using the cross-layer approach that performs packet dropping and reroute the packets using the alternate paths. These packet drops are identified precisely in this work, which significantly reduces false positive rate of detection of malicious nodes. The performance of ADSR is analyzed using a mathematical model by considering the characteristics of a node’s behavior. Using extensive simulations, the performances are thoroughly analyzed and evaluated and compared with traditional dynamic source routing (DSR), Watchdog (WD), Bait-DSR (BDSR) protocols. Simulation results show that with negligible increase in overhead, this protocol provides secured routes with an increased packet delivery ratio (PDR) and throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz IF, Wang X, Wang W (2005) Wireless mesh network: a survey. Comput Netw ISDN Syst 47(4):445–487
J Sen (2013) Security and privacy issues in wireless mesh networks: a survey. In: Wireless networks and security: issues, challenges and research trends, pp 189–272
Akyildiz IF, Wang X (2008) Cross-layer design in wireless mesh networks. IEEE Trans Veh Technol 57(2)
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile adhoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom), pp 255–265
Tsou PC, Chang JM, Lin YH, Chao HC, Chen JL (2011) Developing a BDSR scheme to avoid blackhole attack based on proactive and reactive architecture in MANETs. In: 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, pp 755–760
Stallings W (2006) Cryptography and network security, 4th edn. Prentice Hall
Gao X, Wei C (2007) A novel grayhole attack detection scheme for mobile Ad-Hoc networks. In: IFIP international conference on network and parallel computing workshops, pp 209–214
Bhalaji N, Shanmugam A (2009) Association between nodes to combat blackhole attack in DSR based MANET. 978-1-4244-3474-9/09
Cai J, Yi P, Chen J, Wang Z, Liu N (2010) An adaptive approach to detecting black and grayhole attacks in AdHoc network. In: 24th IEEE international conference on advanced information networking and applications
Woungang I, Dhurandher SK, Peddi RD, Obaidat MS (2012) Detecting blackhole attacks on DSR-based mobile adhoc networks. In: 2012 international conference on Computer, Information and Telecommunication Systems (CITS). Amman, pp 1–5. https://doi.org/10.1109/CITS.2012
Kumar V, Kumar R (2015) Adaptive approach for detection of blackhole attack in mobile Ad hoc network. In: International conference on intelligent computing, communication & convergence. https://doi.org/10.1016/j.procs.2015.04.122
Ding Y-M, Wu H (2016) Key node oriented black hole attack and detection. In: Joint international conference on Artificial Intelligence and Computer Engineering (AICE 2016) and international conference on Network and Communication Security. https://doi.org/10.12783/dtcse/aice-ncs2016/5719
Pu C, Lim S, Chae J, Jung B (2017) Active detection in mitigating routing misbehavior for MANETs. Wirel Netw. https://doi.org/10.1007/s11276-017-1621-z
Thanuja R, Umamakeswari A (2018) Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Cluster Comput. 1–13. https://doi.org/10.1007/s10586-018-2006-5
Shu T, Krunz M (2012) Detection of malicious packet dropping in wireless Adhoc networks based on privacy-preserving public auditing. In: Proceedings of WiSec, pp 87–98
Zhang Y, Lazos L, Kozma W (2016) AMD: audit-based misbehavior detection in wireless Ad Hoc networks. IEEE Trans Mobile Comput 15(8):1893–1907. https://doi.org/10.1109/TMC.2012.257
Azni AH, Ahmad R, Noh ZAM, Basari ASH, Hussin B (2012) Correlated node behavior model based on semi Markov process for MANETS. Int J Comput Sci Issues (IJCSI) 9(1)
Zhao M, Wang W (2006) A novel Semi-Markov smooth mobility model for mobile Ad hoc networks. In: Proceedings of IEEE GLOBECOM, pp 1–5
Sun F, Pi J, Lv J, Cao T (2017) Network security risk assessment system based on attack graph and Markov chain. J Phys
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Thillaikarasi, R., Mary Saira Bhanu, S. (2020). Detection of Packet Dropping Nodes in Wireless Mesh Networks. In: M. Thampi, S., et al. Applied Soft Computing and Communication Networks. ACN 2019. Lecture Notes in Networks and Systems, vol 125. Springer, Singapore. https://doi.org/10.1007/978-981-15-3852-0_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-3852-0_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3851-3
Online ISBN: 978-981-15-3852-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)