Misbehavior detection of nodes in mobile ad-hoc networks using cluster overheads

  • Authors

    • Rampati Purnasai
    • Vasanthadev Suryakala
    • Ramya T
    • Kolangiammal S
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10347
  • AMD, FMR, LTP, Function Point.
  • In this paper we mainly discuss about the problem of identifying the misbehaving nodes in a multi hop ad-hoc network. Misbehaving nodes identification is done using co-operative incentive based approaches. We are considering a cluster based system for identifying misbehaving nodes in a network. A cluster overhead is selected in each cluster for communicating with other clusters. Proposed system is capable of detecting misbehaving nodes using the cluster formation and also the degradation of network lifetime is decreased when compared to the existing protocol. By selecting the cluster over-head we have marginally reduced the time-delay and packet loss ratio in (network simulator 2) simulation environment. Acknowledgement schemes are used to identify selective packet droppers.

  • References

    1. [1] G. Acs, L. Buttyan, and L. Dora, "Misbehaving Router Detection in Link-State Routing for Wireless Mesh Networks," Proc. IEEE Int'l Symp. a World of Wireless, Mobile and Multimedia Networks (WoWMoM '10), pp. 1-6, 2010.

      [2] Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens,“ODSBR: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks,†ACM Transactions Information Systems. Security, vol. 10, no. 4, pp. 11–35, 2008.

      [3] K. Balakrishnan, J. Deng, and P. K. Varshney, “Twoack: Prevent- ing selfishness in mobile Ad Hoc networks,†in Proc. IEEE Wireless Communication Networks. Conference, 2005, pp. 2137–2142.

      [4] S. Buchegger and J.-Y. L. Boudec, “Self-policing mobile Ad-Hoc networks by reputation systems,†IEEE Communications, volume. 43, no. 7, pp. 101–107, Jul. 2005. https://doi.org/10.1109/MCOM.2005.1470831.

      [5] J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentives for collaboration in mobile Ad Hoc networks,†in Proceedings. Workshop Model. Optimization Mobile Ad Hoc Wireless Networks, 2003, pp. 427–439.

      [6] Y. Dong, H. Go, A. Sui, V. Li, L. Hui, and S. Yiu, “Providing dis- tributed certificate authority service in mobile Ad Hoc networks,†in Proc. 1st Int. Conf. Security Privacy Emerging Areas Commun. Netw. 2005, pp. 149–156.

      [7] S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based framework for high integrity sensor networks,â€ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1–37, 2008.https://doi.org/10.1145/1362542.1362546.

      [8] Q. He, D. Wu, and P. Khosla, “SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks,†in Proc. IEEE Wireless Commun. Netw. Conf., 2004, pp. 825–830.

      [9] W. Kozma and L. Lazos, “Dealing with liars: Misbehavior identifi- cation via R#nyi-Ulam games,†in Proc. 5th Int. ICST Conf. Security e Privacy Commun. Netw, 2009, pp. 207–227.

      [10] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowl- edgment-based approach for the detection of routing misbehavior in manets,†IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.https://doi.org/10.1109/TMC.2007.1036.

      [11] T. Shu and M. Krunz, “Detection of malicious packet dropping in wireless Ad Hoc networks based on privacy-preserving public auditing, “ in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 87–98.

      [12] S. Zhong, J. Chen, and Y. R. Yang,â€Sprite: A simple cheat-proof, credit-based system for mobile Ad-Hoc networks, “in Proc. 22nd IEEE Annu. Joint Conf. Comput. Commun, 2003, pp. 1987–1997. https://doi.org/10.1109/INFCOM.2003.1209220.

      [13] T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.https://doi.org/10.1016/j.procs.2016.07.364.

      [14] S.V.Manikanthan and V.Rama“Optimal Performance of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology, ISSN NO: 2456-1983, Vol-2, Issue –Special –March 2017.

      [15] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.

  • Downloads

  • How to Cite

    Purnasai, R., Suryakala, V., T, R., & S, K. (2018). Misbehavior detection of nodes in mobile ad-hoc networks using cluster overheads. International Journal of Engineering & Technology, 7(2.8), 145-148. https://doi.org/10.14419/ijet.v7i2.8.10347