A Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

نویسنده

  • Shirina Samreen
چکیده

Mobile ad hoc network is based upon multi-hop communication wherein the nodes themselves act as routers as well as source. The inherent characteristics of a MANET make it vulnerable to a variety of insider as well as outsider attacks. Most of the secure routing protocols do not focus on the insider attacks wherein certain adversarial nodes may launch a number of attacks on the routing protocol as well as on the data transmission by simply dropping the packets without forwarding them. We propose a secure hybrid routing protocol which combats the packet dropping attack carried on by an individual / colluding adversaries. It forms routes based upon a metric assigned to each node called weight / cost which indicates it’s good / bad behaviour. A least cost route has to be formed by including those nodes with least weight representing good packet forwarding behaviour. The protocol monitors the ongoing data transmission in the form of acknowledgements from destination, detects the adversarial nodes on the path through a mechanism based upon bloom filters used as node behavioural proofs , adjusts the weight of the adversarial nodes and propagates the information so that the proactive routing tables involving the adversarial node update their appropriate routing table entries. The result of these activities is the establishment of a route including those nodes with good packet forwarding behaviour. General Terms Mobile Ad hoc Networks (MANETs), Routing Protocols, Attacks on MANET, Secure Routing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Extension to Secure Hybrid Routing Protocol to Combat Malicious Packet Dropping in a MANET

Communication in a Mobile ad hoc network is accomplished in a multi-hop fashion wherein the nodes themselves act as routers as well as source. MANET is vulnerable to a variety of insider as well as outsider attacks because of it's inherent characteristics like dynamically changing topology, limited power and no centralized authority to monitor the behaviour of the nodes . Most of the secur...

متن کامل

TRIUMF: Trust-Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack

In a m obile ad-hoc network, nodes cannot rely on a ny fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. H owever, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than i...

متن کامل

A Novel Secure Routing Protocol in MANET

This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to...

متن کامل

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism

In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks....

متن کامل

A Newly Routing Protocol for MANET

The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to passive and active attacks by malicious nodes. In this paper we propose a new trust based relationship among the nodes to combat the packet dropping attack. In our scheme we considered the Dynamic Source Routing (DSR)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013