An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

نویسندگان

  • Shirina Samreen
  • G. Narasimha
  • Jan Schaumann
چکیده

Communication in a Mobile ad hoc network is accomplished in a multi-hop fashion wherein the nodes themselves act as routers as well as source. MANET is vulnerable to a variety of insider as well as outsider attacks because of it's inherent characteristics like dynamically changing topology, limited power and no centralized authority to monitor the behaviour of the nodes . Most of the secure routing protocols focus on the control plane attacks targeting the different elements of the routing protocol but data plane attacks are more difficult to handle for which we need to ensure secure data forwarding since certain adversarial nodes may launch a number of attacks on the data transmission by simply dropping the packets without forwarding them. The current paper is an extension to our earlier work where we addressed one of the most difficult data plane attacks namely, the packet dropping attack. In our earlier work, we had proposed a secure hybrid routing protocol which combats the packet dropping attack carried on by an individual / colluding adversaries and elaborated upon the first two phases of Secure Least Cost route establishment and Detection of individual node / colluding nodes maliciously dropping packets. Once a node has been identified as an adversary, we need to work upon the remedial action to prevent the future routes from involving adversarial nodes. In the current paper, we elaborate upon the last two phases namely: Punishing the adversarial nodes upon misbehaviour detection and Propagation of information about node misbehaviour and good

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

Mobile ad hoc network is based upon multi-hop communication wherein the nodes themselves act as routers as well as source. The inherent characteristics of a MANET make it vulnerable to a variety of insider as well as outsider attacks. Most of the secure routing protocols do not focus on the insider attacks wherein certain adversarial nodes may launch a number of attacks on the routing protocol ...

متن کامل

TRIUMF: Trust-Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack

In a m obile ad-hoc network, nodes cannot rely on a ny fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. H owever, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than i...

متن کامل

A Novel Secure Routing Protocol in MANET

This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to...

متن کامل

A Newly Routing Protocol for MANET

The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to passive and active attacks by malicious nodes. In this paper we propose a new trust based relationship among the nodes to combat the packet dropping attack. In our scheme we considered the Dynamic Source Routing (DSR)...

متن کامل

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism

In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013