Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: Mobile ad-hoc network, selfish nodes, reputation-based techniques, acknowledgment-based techniques.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1125871
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1376References:
[1] Abbas, S., Merabti, M., and Llewellyn-Jones, D. (2010). A Survey of Reputation Based Schemes for MANET. (Online) Available: http://www.cms.livjm.ac.uk/pgnet2010/MakeCD/Papers/2010046.pdf (Jan. 30, 2015).
[2] Balakrishnan K., Deng, J., Liu, K. and Varshney, P. K. “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[3] Balakrishnan, K., Deng, J., and Varshney, P.K.” TWOACK: Preventing selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. WCNC 2005, March 2005. (Jan. 24, 2015).
[4] Buchegger S., Le Boudec, J. (2002). “Performance analysis of the CONFIDANT protocol (Cooperation of nodes dairness in dynamic ad-hoc network)”, in Proceeding 3rd ACM (MobileHoc’02). pp 226-336. (Jan. 26, 2015).
[5] Kachirski, O., Guha, R. (2003). “Effective Intrustion Detection Using Multiple Sensors in Wireless Ad Hoc Networks”, in Proceeding IEEE, (HICSS’03), pp 55.1. (Jan. 24, 2015).
[6] Kargl, F., Klenk, A., Schlott, S., and Weber, M. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) (Sept. 2004), Springer Verlag, pp. 152–165.
[7] Karthik, M., John, J. (2013). “A Survey of Techniques Used To Detect Selfish Nodes in MANET”. International Journal for Scientific Research & Development. (Online). 1(4), pp. 1029-1032. Available: http://www.ijsrd.com/articles/IJSRDV1I4052.pdf (Jan. 6, 2015).
[8] Koroupi, F., Kuchaki, M., and Movaghar, A. (2008). Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes. World Academy of Science, Engineering and Technology, 44, pp. 351-355. Available: http://waset.org/publications/6483/investigating- intrusion-detection-systems-in-manet-and-comparing-idss-for-detecting- misbehaving-nodes (Jan.27, 2015).
[9] Michiardi P., Molva, R. (2002). “Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, in International Conference on (CMS’02). (Jan. 26, 2015).