Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/345910.345955acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article
Free access

Mitigating routing misbehavior in mobile ad hoc networks

Published: 01 August 2000 Publication History

Abstract

This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavior. We use a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percentage of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a network with moderate mobility, the two techniques increase throughput by 17% in the presence of 40% misbehaving nodes, while increasing the percentage of overhead transmissions from the standard routing protocol's 9% to 17%. During extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocol's 12% to 24%.

References

[1]
S. Basagni and et al. A Distance Routing Effect Algorithm for Mobility (DREAM). In Proceedings of the Fourth Annual A CM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98), October 1998.
[2]
V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Medium Access Protocol for Wireless LANs. In Proceedings of A CM SIGCOMM '9~, August 1994.
[3]
J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. in Proceedings of the Fourth Annual A CM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98), October 1998.
[4]
R. Castaneda and S. R. Das. Query Localization Techniques for On-Demand Routing Protocols in Ad Hoc Networks. In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '99), August 1999.
[5]
S. Corson and V. Park. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification. Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.
[6]
B. P. Crow, I. K. Widjaja, G. Jeong, and P. T. SakaJ. IEEE-802.11 Wireless local Area Networks. IEEE Communications Magazine, vol. 35, No.9: pages 116-126, September 1997.
[7]
S. Das, C. E. Perkins and E. M. Royer. Ad Hoc On Demand Distance Vector (AODV) Routing (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, iETF, October 1999.
[8]
K. Fall and K. Varadhan, editors, ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, July 1999. Available from http://vvv-mash, ca. berkeley, edu/ns/.
[9]
J.J. Garcia-Luna-Aceves and M. Spohn. Source-Tree Routing in Wireless Networks. In Proceedings IEEE ICNP 99: 7th International Conference on Network Protocols, Toronto, Canada, October 31-November 3, 1999.
[10]
J.J. Garcia-Luna-Aceves, Marcelo Spohn, and David Beyer. Source Tree Adaptive Routing (STAR) Protocol (Internet-Draft). Mobile Ad hoc Network (MANET) Working Group, IETF, October 1999.
[11]
P. Johansson and T. Larsson. Scenario-Based Performance Analysis of Routing Protocols for Mobile Ad-Hoc Networks. in Proceedings of the Fifth Annual A CM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '99), August 1999.
[12]
D. Johnson, D. A. Maltz, and J. Broch. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999. D. Johnson. Personal Communication. February 2000.
[13]
J. Jubin and J. Tornow. The DARPA Packet Radio Network Protocols. In Proceedings of the IEEE, 75(1):21-32, 1987.
[14]
Y.-B. Ko and N. H. Vaidya. Location-Aided Routing (LAR) in Mobile Ad Hoc Networks. In Proceedings of the Fourth Annual A CM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98), October 1998.
[15]
Y.-B. Ko and N. H. Vaidya. Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms. WMGSA '99, New Orleans.
[16]
IETF MANET Working Group Internet Drafts. http://vvv, ietf. org/ids, by. vg/manet, html.
[17]
J. K. Ousterhout. Tcl and the Tk Toolkit. Addison-Wesley, 1994.
[18]
S. H. Park, A. Ganz, and Z. Ganz. Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications. Vol. 3. 1998.
[19]
C.E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of the SIG COMM '9d Conference on Communications Architectures, Protocols and Applications, pages 234-244, August 1994.
[20]
R. Prakash. Unidirectional Links Prove Costly in Wireless Ad Hoe Networks. in Proceedings of DIMA CS Workshop on Mobile Networks and Computers, 1999.
[21]
B. Smith and J.J. Garcia-Luna-Aceves. Efficient Security Mechanisms for the Border Gateway Routing Protocol. Computer Communications (Elsevier), Vol. 21, No. 3: pp. 203-210, 1998,.
[22]
B. Smith, S. Murthy, and j.J. Garcia-Luna-Aceves. Securing Distance-Vector Routing Protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, February 1997.
[23]
F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. B. Christianson, B. Crispo, and M. Roe (Eds.)., Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.
[24]
D. G. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.
[25]
The CMU Monarch Project. The CMU Monarch Projects Wireless and Mobility Extensions to ns. http://vsw .monarch. ca. cmu. edu/cmu-ns, html. Oct. 12, 1999.
[26]
C.-K. Toh. Associativity Based Routing For Ad-Hoc Mobile Networks. Wireless Personal Communications Journal, Special Issue on Mobile Networking and Computing Systems, Vol. 4, No. 2, pp.103-139, March 1997.
[27]
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no.6, November/December 1999.

Cited By

View all
  • (2024)Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-15026(164-172)Online publication date: 11-Jan-2024
  • (2024)Social Trust Confirmation-Based Selfish Node Detection Algorithm in Socially Aware NetworksElectronics10.3390/electronics1319379713:19(3797)Online publication date: 25-Sep-2024
  • (2024)Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding AttackApplied Sciences10.3390/app1407287414:7(2874)Online publication date: 29-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
August 2000
300 pages
ISBN:1581131976
DOI:10.1145/345910
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2000

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

MobiCom00
Sponsor:

Acceptance Rates

MobiCom '00 Paper Acceptance Rate 28 of 226 submissions, 12%;
Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)192
  • Downloads (Last 6 weeks)23
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-15026(164-172)Online publication date: 11-Jan-2024
  • (2024)Social Trust Confirmation-Based Selfish Node Detection Algorithm in Socially Aware NetworksElectronics10.3390/electronics1319379713:19(3797)Online publication date: 25-Sep-2024
  • (2024)Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding AttackApplied Sciences10.3390/app1407287414:7(2874)Online publication date: 29-Mar-2024
  • (2024)A Reinforcement Learning-Based Incentive Scheme for Multi-Hop Communications in Vehicular NetworksIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.331664410:1(335-347)Online publication date: Feb-2024
  • (2024)Effect of Link Breaks on Performance of MANETs2024 International Conference on Electrical, Computer and Energy Technologies (ICECET10.1109/ICECET61485.2024.10698154(1-5)Online publication date: 25-Jul-2024
  • (2024)Cooperation Algorithm Based on Bandwidth Exchanging and Power Optimization in Wireless Networks2024 5th International Conference on Electronic Communication and Artificial Intelligence (ICECAI)10.1109/ICECAI62591.2024.10674817(1-7)Online publication date: 31-May-2024
  • (2024)Secure and Trustworthy Multipath Routing for QoS Improvement in MANETs using Fuzzy Logic2024 International Conference on Data Science and Network Security (ICDSNS)10.1109/ICDSNS62112.2024.10691325(1-5)Online publication date: 26-Jul-2024
  • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
  • (2024)Smart Strategies for Energy-Aware Rouge Node Detection in Mobile Ad-hoc Networks2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT)10.1109/ICDCOT61034.2024.10515533(1-6)Online publication date: 15-Mar-2024
  • (2024)EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETsComputer Communications10.1016/j.comcom.2024.02.012218(148-156)Online publication date: Mar-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media