To Cope with Misbehavior in Mobile Ad-Hoc Networks and Performance Analysis with DSR Protocol

V. Sumalatha*, Prasanthi**
* Assistant Professor, JNTUACE, Anantapur.
** Associate Professor, JNTUACE, Anantapur.
Periodicity:April - June'2010
DOI : https://doi.org/10.26634/jse.4.4.1182

Abstract

Ad-Hoc wireless networks have emerged as one of the key growth areas for wireless networking and computing technology. One of the major factors effecting the ad-hoc communication is the misbehaving of nodes. Node misbehavior due to selfish or maliciousness or faults can significantly degrade the performance of mobile ad hoc networks. Most of the routing protocols in wireless ad hoc networks, such as DSR, fail to detect misbehavior and assume nodes are trustworthy and cooperative.

Dynamic Source Routing protocol is modified to cope with misbehavior. It enables nodes to detect misbehavior by first-hand observation and use the second-hand information provided by other nodes. The view a node has about the behavior of another node is captured in a reputation system, which is used to classify nodes as misbehaving or normal. Once a misbehaving node is detected, it is isolated from the network. Reputation systems can, however be tricked by the spread of false reputation ratings, be it false accusations or false praise. To solve this problem, a fully distributed reputation system is proposed that can cope with false information and effectively use second-hand information in a safe way. Approach is based on modified Bayesian estimation and classification procedure for the isolation of malicious and selfish nodes of given network.

In this paper, tests are performed for the network containing normal nodes and misbehaving nodes, the delay plots of original DSR and Modified DSR is compared and performance has been analyzed. The proposed task is implemented in MATLAB for protocol implementation and verification.

Keywords

Adhoc Networks, DSR, Misbehavior, Reputation System, Trust.

How to Cite this Article?

V. Sumalatha and Prasanthi (2010). To Cope with Misbehavior in Mobile Ad-Hoc Networks and Performance Analysis with DSR Protocol.i-manager’s Journal on Software Engineering, 4(4), 61-65. https://doi.org/10.26634/jse.4.4.1182

References

[1]. Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna- Aceves J. J. (1997). Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego,CA, pp 85-92, February.
[2]. Levente Buttyan and Jean-Pierre Hubaux (2000). Enforcing service availability in mobile ad-hoc wans. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA,August (2001).
[3]. Levente Buttyan and Jean-Pierre Hubaux (2001). Stimulating cooperation in self-organizing mobile adhoc networks. Technical Report DSC/2001/046, EPFL-DI-ICA, August 2001.
[4]. Lidong Zhou and Zygmunt Haas (1999). Securing ad hoc networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No.6, November/December, pages 24-30.
[5]. Matt Blaze, Joan Feigenbaum, and Jack Lacy (1996). Decentralized trust management. In Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, 1996.
[6]. Ross Anderson and Frank Stajano (1999). The resurrecting duckling. Lecture Notes in Computer Science, Springer- Verlag.
[7]. Sonja Buchegger and Jean-Yves Le Boudec (2002). Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp 403 - 10, Canary Islands, Spain, January 2002. IEEE Computer Society.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.