Skip to main content

Detection of Packet Dropping Nodes in Wireless Mesh Networks

  • Chapter
  • First Online:
Applied Soft Computing and Communication Networks (ACN 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 125))

Included in the following conference series:

  • 174 Accesses

Abstract

Wireless mesh network (WMN) is a wireless ad hoc network which uses mesh topology to connect the radio nodes together and it is prone to vulnerabilities due to its open architecture. Packet loss is the major issue due to its open wireless physical media, frequent topological changes, scalability and power constraints. In general, packet drops in WMN during transmission may happen due to mobility or buffer overflow or power depletion or malicious behavior of the intermediate nodes which degrades the performance of WMN. This paper proposes an adaptive dynamic source routing protocol (ADSR) to detect the misbehaving node using the cross-layer approach that performs packet dropping and reroute the packets using the alternate paths. These packet drops are identified precisely in this work, which significantly reduces false positive rate of detection of malicious nodes. The performance of ADSR is analyzed using a mathematical model by considering the characteristics of a node’s behavior. Using extensive simulations, the performances are thoroughly analyzed and evaluated and compared with traditional dynamic source routing (DSR), Watchdog (WD), Bait-DSR (BDSR) protocols. Simulation results show that with negligible increase in overhead, this protocol provides secured routes with an increased packet delivery ratio (PDR) and throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh network: a survey. Comput Netw ISDN Syst 47(4):445–487

    Article  Google Scholar 

  2. J Sen (2013) Security and privacy issues in wireless mesh networks: a survey. In: Wireless networks and security: issues, challenges and research trends, pp 189–272

    Google Scholar 

  3. Akyildiz IF, Wang X (2008) Cross-layer design in wireless mesh networks. IEEE Trans Veh Technol 57(2)

    Google Scholar 

  4. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile adhoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom), pp 255–265

    Google Scholar 

  5. Tsou PC, Chang JM, Lin YH, Chao HC, Chen JL (2011) Developing a BDSR scheme to avoid blackhole attack based on proactive and reactive architecture in MANETs. In: 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, pp 755–760

    Google Scholar 

  6. Stallings W (2006) Cryptography and network security, 4th edn. Prentice Hall

    Google Scholar 

  7. Gao X, Wei C (2007) A novel grayhole attack detection scheme for mobile Ad-Hoc networks. In: IFIP international conference on network and parallel computing workshops, pp 209–214

    Google Scholar 

  8. Bhalaji N, Shanmugam A (2009) Association between nodes to combat blackhole attack in DSR based MANET. 978-1-4244-3474-9/09

    Google Scholar 

  9. Cai J, Yi P, Chen J, Wang Z, Liu N (2010) An adaptive approach to detecting black and grayhole attacks in AdHoc network. In: 24th IEEE international conference on advanced information networking and applications

    Google Scholar 

  10. Woungang I, Dhurandher SK, Peddi RD, Obaidat MS (2012) Detecting blackhole attacks on DSR-based mobile adhoc networks. In: 2012 international conference on Computer, Information and Telecommunication Systems (CITS). Amman, pp 1–5. https://doi.org/10.1109/CITS.2012

  11. Kumar V, Kumar R (2015) Adaptive approach for detection of blackhole attack in mobile Ad hoc network. In: International conference on intelligent computing, communication & convergence. https://doi.org/10.1016/j.procs.2015.04.122

  12. Ding Y-M, Wu H (2016) Key node oriented black hole attack and detection. In: Joint international conference on Artificial Intelligence and Computer Engineering (AICE 2016) and international conference on Network and Communication Security. https://doi.org/10.12783/dtcse/aice-ncs2016/5719

  13. Pu C, Lim S, Chae J, Jung B (2017) Active detection in mitigating routing misbehavior for MANETs. Wirel Netw. https://doi.org/10.1007/s11276-017-1621-z

    Article  Google Scholar 

  14. Thanuja R, Umamakeswari A (2018) Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Cluster Comput. 1–13. https://doi.org/10.1007/s10586-018-2006-5

  15. Shu T, Krunz M (2012) Detection of malicious packet dropping in wireless Adhoc networks based on privacy-preserving public auditing. In: Proceedings of WiSec, pp 87–98

    Google Scholar 

  16. Zhang Y, Lazos L, Kozma W (2016) AMD: audit-based misbehavior detection in wireless Ad Hoc networks. IEEE Trans Mobile Comput 15(8):1893–1907. https://doi.org/10.1109/TMC.2012.257

    Article  Google Scholar 

  17. Azni AH, Ahmad R, Noh ZAM, Basari ASH, Hussin B (2012) Correlated node behavior model based on semi Markov process for MANETS. Int J Comput Sci Issues (IJCSI) 9(1)

    Google Scholar 

  18. Zhao M, Wang W (2006) A novel Semi-Markov smooth mobility model for mobile Ad hoc networks. In: Proceedings of IEEE GLOBECOM, pp 1–5

    Google Scholar 

  19. Sun F, Pi J, Lv J, Cao T (2017) Network security risk assessment system based on attack graph and Markov chain. J Phys

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Thillaikarasi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thillaikarasi, R., Mary Saira Bhanu, S. (2020). Detection of Packet Dropping Nodes in Wireless Mesh Networks. In: M. Thampi, S., et al. Applied Soft Computing and Communication Networks. ACN 2019. Lecture Notes in Networks and Systems, vol 125. Springer, Singapore. https://doi.org/10.1007/978-981-15-3852-0_3

Download citation

Publish with us

Policies and ethics