Skip to main content

TRIDNT: Isolating Dropper Nodes with Some Degree of Selfishness in MANET

  • Conference paper
Advances in Computer Science and Information Technology (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 131))

Abstract

In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Therefore, some network nodes may decide against cooperating with others; selfish nodes; to save their resources. Also these networks are extremely under threat to insider; malicious nodes; especially through packet dropping attacks.

In this paper, we design a novel monitoring and searching scheme to detect and isolate the dropper nodes in ad-hoc networks, called TRIDNT (Two node-disjoint Routes scheme for Isolating Dropper Node in MANET). TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbors, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behavior of routing path nodes: if a malicious behavior is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally our scheme reduces the searching time of malicious nodes, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D., Maltz, D.: Dynamic Source Routing protocol (DSR) for Mobile Ad Hoc Wireless Networks for IPv4. RFC 4728 (February 2007), http://www.ietf.org/rfc/rfc4728.txt

  2. Perkins, C.E., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing, RFC 3561 txt (July 2003), http://www.ietf.org/rfc/rfc3561

  3. Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. ACM SIGCOMM, pp. 234–244 (1994)

    Google Scholar 

  4. Vaidya, B., Yeo, S.S., Choi, D.-Y., Jo Han, S.: Robust and secure routing scheme for wireless multihop network. Personal and Ubiquitous Computing magazine (April 4, 2009)

    Google Scholar 

  5. Hu, Y.-C., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks Journal 11, 21–38 (2005)

    Article  Google Scholar 

  6. Sanzgiri, K., LaFlamme, D., Dahill, B., Neil Levine, B., Shields, C., Belding-Royer, E.M.: Authenticated Routing for Ad Hoc Networks. Proceedings of IEEE journal on selected areas in communications 23(3) (March 2005)

    Google Scholar 

  7. Mahapatra, R.P., SM IACSIT, Katyal, M.: Taxonomy of Routing Security for Ad-Hoc Network. International Journal of Computer Theory and Engineering 2(2), 303–307 (2010)

    Article  Google Scholar 

  8. Wang, D., Hu, M., Zhi, H.: A Survey of Secure Routing in Ad Hoc Networks. In: The Ninth International Conference on Web-Age Information Management (waim), pp. 482–486 (2008)

    Google Scholar 

  9. Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy 2(3), 28–39 (2004)

    Article  Google Scholar 

  10. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.-Y.: Trust Based Routing for Misbehavior Detection in Ad Hoc Networks. Journal Of Networks 5(5), 551–558 (2010)

    Article  Google Scholar 

  11. Azer, M.A., El-Kassas, S.M., Hassan, A.W.F., El-Soudani, M.S.: A Survey on Trust and Reputation Schemes in Ad Hoc Networks. In: Third International Conference on Availability, Reliability and Security, pp. 881–886 (2008)

    Google Scholar 

  12. Aad, I., Hubaux, J.-P., Knightly, E.W.: Impact of Denial of Service Attacks on Ad Hoc Networks. IEEE/ACM Transactions on Networking 16(4), 791–802 (2008)

    Article  Google Scholar 

  13. Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of Mobicom (2004)

    Google Scholar 

  14. Kuzmanovic, A., Knightly, E.: Low-rate TCP-targeted denial of service attacks (the shrew vs. the mice and elephants). In: Proceedings of ACM SIGCOMM (2003)

    Google Scholar 

  15. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  16. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks). In: Proceedings of the 3rd ACM International Symposium on Mobile and Ad Hoc Networking & Computing (MobiHoc 2002), Lausanne, Switzerland, pp. 226–236 (June 2002)

    Google Scholar 

  17. Balakrishnan, K., Deng, J., Varshney, P.K.: Twoack: preventing selfishness in mobile ad hoc networks. In: The IEEE Wireless Communication and Networking Conference(WCNC 2005), New Orleans, LA,USA, pp. 2137–2142 (March 2005)

    Google Scholar 

  18. Zeshan, M., Khan, S.A., Cheema, A.R., Ahmed, A.: Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks. In: International Seminar on Future Information Technology and Management Engineering, pp. 568–572 (2008)

    Google Scholar 

  19. Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wirel. Commun. Mob. Comput., 969–988 (2006), http://www.interscience.wiley.com

  20. Nasipuri, A., Das, S.R.: On-demand multipath routing for mobile ad hoc networks. In: Computer Eight International Conference on Communications and Networks, pp. 64–70 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abd El-Haleem, A.M., Ali, I.A., Ibrahim, I.I., El-Sawy, A.R.H. (2011). TRIDNT: Isolating Dropper Nodes with Some Degree of Selfishness in MANET. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. CCSIT 2011. Communications in Computer and Information Science, vol 131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17857-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17857-3_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17856-6

  • Online ISBN: 978-3-642-17857-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics