Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks

Size: px
Start display at page:

Download "Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks"

Transcription

1 Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of Waterloo, Canada s: {mmabdels, Abstract Node cooperation in relaying others packets and route stability are essential for high-performance multi-hop wireless networks and reliable data transmission. In this paper, we propose a protocol called TETO for stimulating the nodes cooperation and establishing stable routes. TETO uses credits (or micropayment) to stimulate the nodes cooperation and processes the payment receipts to evaluate the nodes packet relay probabilities in terms of trust values. Stable routes are established through the highly trusted nodes having sufficient energy. Extensive analysis and simulations demonstrate that TETO can secure the payment and trust calculation and significantly improve route stability and thus the packet delivery ratio. Index Terms Security; selfish nodes; trust-based routing protocol. I. INTRODUCTION The mobile nodes of the multi-hop wireless networks (MWNs) usually relay others packets for enhancing the network deployment and performance [1]. However, due to involving autonomous devices in packet relay, the routing process suffers from new security challenges that endanger the practical implementation of the MWNs. The selfish nodes will not relay others packets without benefits, and the misbehaving nodes involve themselves in routes and drop the packets, which jeopardizes the routes stability and the network availability. For example, some nodes may drop the packets because they do not have sufficient energy; the malfunctioned nodes drop the packets due to faulty hardware or software; and in hostile environments, the attackers launch denial-of-service attacks by dropping the packets. Moreover, the nodes may possess different hardware capabilities in terms of CPU cycles and buffer size, and mobility level, and thus the high-hardware-resource nodes with low mobility level are more capable of performing packet relay. Route stability and node cooperation are essential for highperformance MWNs and reliable data transmission. Frequent route failures adversely affect the network performance in terms of throughput and delay [2]. The presence of even a small number of misbehaving nodes could result in repeatedly broken routes. Hence, in order to enhance the route stability, it is essential to establish the routes through the nodes having sufficient energy and high packet-relay probability. Reputation and credit based mechanisms [2-7] have been proposed to force and stimulate the nodes cooperation, respectively. For reputation-based mechanisms [2-4], each node usually monitors the transmissions of its neighbors to measure how frequency they drop the packets in terms of reputation values. A node s reputation is increased when it relays a packet, but the reputation is decreased when the node drops a packet. Once a node s reputation degrades to a threshold, the node is identified as uncooperative and punished. However, the reputation-based mechanisms force the nodes to relay others packets without any benefits and cannot achieve fairness, e.g., although the nodes situated at the network center relay much more packets than those at the periphery, they are not compensated. For credit-based mechanisms [5-7], packet relay is a service not an obligation. The source and destination nodes pay credits (or micropayment) to the intermediate nodes to relay their packets. In addition to cooperation stimulation, these mechanisms can achieve fairness by rewarding credits to the nodes that relay more packets. However, cooperation stimulation alone is not sufficient for route stability that requires selecting the trusted nodes having sufficient energy. In this paper, we propose TETO, a Trust-based and Energy-aware routing and incentive protocol, for MWNs. TETO uses credits to stimulate the nodes cooperation and processes the payment receipts to evaluate the probability of packet relay in terms of trust value. A node s trust value is decreased whenever it is accused of packet drop, and increased whenever it relays a packet. TETO establishes routes through the highly trusted nodes having sufficient energy, which can minimize the probability of packet drop and session breakage. In this way, TETO stimulates the nodes not only to cooperate but also to provide high packet-relay quality and tell the truth about their residual energy to raise their chances to be selected in future routes. Our analysis and simulations demonstrate that TETO can secure the payment and trust calculation and significantly improve the packet delivery ratio due to making informed decisions regarding route selection. The main contribution of the paper is three-fold: (1) This is the first incentive protocol that can evaluate the nodes packet-relay probability and proposes a trust system to quantify this probability; (2) TETO is the first protocol that can stimulate the nodes cooperation and make informed routing decisions based on the nodes past behavior and residual energy; and (3) The proposed protocol stimulates the nodes not only to cooperate but also to provide high packetrelay ratio and tell the truth about their energy. The remainder of this paper is organized as follows. Section II reviews the related work. Section III gives the network and threat models. Section IV proposes TETO. Security and performance evaluations are given in Sections V and VI, respectively, followed by conclusion in Section VII. II. RELATED WORK A. Reputation-Based Mechanisms The proposed mechanism in [2] establishes routes that avoid the uncooperative nodes without punishing them, which /11/$ IEEE

2 imposes extra load on the cooperative nodes without any benefits. In [3], each node counts the packets relayed both by and for a neighboring node and the ratio of these counts is combined with reports from other nodes to calculate the node s reputation. However, the nodes that are less frequently selected, such as those at the network perimeter, have falsely bad reputation. DRIPO [4] identifies the broken links from the payment receipts, and the nodes that are frequently involved in broken links are identified as malicious and evicted. Nevertheless, determining a good threshold to differentiate between the malicious and the honest nodes is not easy. B. Credit-Based Mechanisms In credit-based mechanisms, the nodes usually submit receipts (proofs of packet relay) to a central unit called trusted party (TP) to claim the payment. In [5], the source node signs the identities of the route s nodes and appends the signature to each message. Unlike Sprite that charges only the source node, PIS [6] charges both the source and destination nodes when both of them benefit from the communication. In [7], each node submits a report containing its alleged charges and rewards. The truthful reports are cleared with almost no processing overhead, and lightweight statistical methods are used to identify the cheating nodes that submit incorrect reports. destination, and the nodes in the route compose payment receipts. In Credit-Account and Trust Update phases, the TP updates the nodes credit account and trust values, respectively. Finally, in Route Establishment phase, TETO establishes routes through the highly trusted nodes having sufficient energy. Certificates with updated trust values The network nodes Route Establishment The trusted party Trust Update Data Transmission Credit-Account Update Fig. 1: The architecture of TETO. Payment receipts III. SYSTEM MODELS A. Network Model The considered MWN has mobile nodes, the TP, and base stations in some networks. The source nodes messages may be relayed in several hops by the intermediate nodes to the destination nodes. The TP generates public/private key pair and certificate for each node to participate in the network. Each node contacts the TP periodically to submit the receipts and renew its certificate. This connection can occur via the base stations, Wi-Fi hotspots, or the Internet. Once the TP receives the receipts, it updates the nodes credit accounts and trust values. A node s certificate has short lifetime, e.g., two weeks, and contains the node s trust value. For the payment model, the source and destination nodes are charged for every transmitted message even if it does not reach the destination, but the intermediate nodes are rewarded only for the delivered messages. B. Threat and Trust Models The mobile nodes and the base stations are probable attackers, but the TP is fully secure. The attackers aim to communicate freely and steal credits. They also may launch trust-boost attacks to augment their trust illegally and false-accusation attacks to defame the honest nodes trust. The attackers may also launch denial-of-service attacks by dropping the packets. Our objective is to protect the payment against singular and colluding attackers, and protect the trust calculation against singular attackers and make collusion attacks difficult, expensive, and less effective. Thwarting collusion attacks has been extensively studied in Web-related trust systems [8]. These solutions can be implemented more effectively in TETO because it is difficult to obtain multiple identities compared to Web applications. For the trust models, the nodes fully trust the TP to perform billing and trust calculation, but the TP does not trust any node. IV. THE PROPOSED TETO Fig. 1 shows that TETO has four main phases. In Data Transmission phase, the source node transmits messages to the Fig. 2: The exchanged security tags in a session. Fig. 3: The format of a session receipt. A. Data Transmission As shown in Fig. 2, the source node (S) sends its signature Sig S (R, TS, C, H(M C )) in the Cth data packet in the session. The signature contains the identities of the nodes in the route (e.g., R = ID S, ID W, ID X, ID Y, ID Z, ID D in Fig. 2), the message s hash value (H(M C )), the message s number (C), and time stamp (TS). This signature can ensure the message s authenticity and integrity. Signing H(M C ) instead of M C can reduce the receipt size because the smaller-size H(M C ) is attached to the receipt. Each intermediate node verifies the source node s signature. The destination node (D) generates a hash chain by iteratively hashing a random value h S S times to produce the hash chain root or h 0, where h i-1 = H(h i ) and 1 i S. From Fig. 2, after receiving the Cth data packet, the destination node sends back ACK packet containing the pre-image of the last hash value (h C ) as a proof for receiving C messages. The nodes save the last hash value and signature for the receipt composition. Each node in the session composes and submits a receipt to the TP. From Fig. 3, a session receipt contains the identities of the payers and payees (R), TS, C, H(M C ), h 0, h C, the messages number that the intermediate nodes committed to relay (C m ), and undeniable security token for preventing payment manipulation. The security token contains the hash value of the last source node s signature and the authentication code (Auth_Code) that authenticates the hash chain and the intermediate nodes to hold them accountable for packet drop. Attach-

3 ing the hash value instead of the signatures reduces the receipt size significantly. In Route Establishment phase, we will discuss how the Auth_Code and C m are computed. B. Credit-Account Update Once the TP receives a receipt, it first checks if the receipt has been deposited before using its unique identifier (R, TS). Then, the TP verifies the receipt s credibility by generating the nodes signatures and hashing them. A receipt is credible if the resultant hash value is identical to the receipt s security token. The TP verifies the destination node s hash chain by hashing h C C times to produce h 0. Finally, the TP clears the receipt according to the payment model discussed in Section III-A. C. Trust Update The TP considers that a node relayed a message if there is a successor in the route reports receiving the message, i.e., the possession of Sig S (R, TS, C, H(M C )) by node W entails that all the nodes before W in the route indeed relayed C messages. For example, in Fig. 4(a), node W received C messages because its receipt contains a signature for C messages, and it relayed all of them because the receipt of X is for C messages. The link between X and Y is broken because X and Y submit receipts for C and C-1 messages. The TP cannot accuse only X of dropping the packet because Y may drop the packet and submit Sig S (R, TS, C-1, H(M C-1 )) instead of Sig S (R, TS, C, H(M C )) to circumvent the TP. The rationale here is that the nodes that drop the packets more frequently will be accused more and thus suffer from more trust degradation. Moreover, an honest node can protect its trust value by not involving itself in sessions with a neighbor that frequently drops the packets. The neighbors of the malicious nodes change due to the nodes mobility and thus the accusations are distributed instead of focusing them on few nodes. Fig. 4(a) shows that Z received C-1 messages and relayed all of them because the receipt of D is for C-1 messages. The ACK packets are also analyzed by the same way, e.g., in Fig, 4(b), the session was broken by Y or X during relaying the Cth ACK packet because they submit h C and h C-1, respectively. T A a. A broken session during relaying the Cth data packet. b. A broken session during relaying the Cth ACK packet. Fig. 4: Evaluating the nodes trust values. of relayed messages in the last ω sessions of received messages in the last ω sessions The notion of trust used in this paper is defined as the probability that a node relays a packet. T(A) refers to the trust value of node A, which is represented with a number in the range [0, +1] signifying a continuous range from complete distrust (0) to complete trust (+1). From Eq. 1, T(A) is the number of relayed messages to the number of received messages by A in the last ω sessions. If A drops a large ratio of the packets, e.g., due to malicious action or high mobility, T (A) will be very low. The trust value is calculated only for the last ω sessions, e.g., 100 to sessions, because recent steady behavior is a better predictor for future behavior than behavior observed a long time ago. Route reliability can be computed using the nodes trust values to get probabilistic information about the route stability, which can be used in route selection. Eq. 2 gives the probability that a packet can be transferred through a route with nodes W, X, Y, and Z. Comparing the reliabilities of routes 1 and 2 in Table 1, the low-trust node, such as X in route 2, has very little chance to be involved in a session because it significantly degrades the route reliability. Although the nodes trust values of route 3 are the same as those of route 1, route 3 has higher reliability, which demonstrates that the shortest routes are preferable. The probability that a packet is transferred through route 4 is close to zero because the nodes have very low trust values, which demonstrates the importance of choosing good nodes. T WXYZ T W T X T Y T Z Table 1: Numerical examples for route reliability. Route T(W) T(X) T(Y) T(Z) T(WXYZ) D. Route Establishment In this section, we propose two routing protocols called the Shortest Reliable Route (SRR) and the Best Available Route (BAR). The SRR protocol establishes the shortest route that meets the source node s requirements, but the destination node selects the best route in the BAR protocol. 1) The SRR Routing Protocol RREQ Delivery: To establish a route to the destination node D, the source node S broadcasts the Route Request Packet (RREQ) that contains the identities of the source (ID S ) and the destination (ID D ) nodes, time stamp (TS), the Time-To-Live (TTL) or the maximum number of intermediate nodes, and the trust and energy requirements. The trust requirement is the minimum trust value an intermediate node can have, and the energy requirement (C m ) is the minimum number of messages an intermediate node commits to relay in the session, which is related to the node s energy. If a node breaks the route before relaying C m messages, the node s trust value is decreased. The route reliability is bounded by the minimum trust value raised to the TTL-th power. A node broadcasts the packet after attaching its identity if it can meet the source node s requirements and TS is within a proper range. Only the first RREQ is broadcasted and the subsequent requests for the same session are discarded. The source node s requirements cannot be achieved if it does not receive the Route Reply Packet (RREP) within τ S time period. The source node can send a second round of RREQ after reducing its requirements, or revert to the BAR protocol. The rationale of the SRR protocol is that the node that satisfies the requirements is trusted enough to act as a relay. Route Selection: The first received RREQ packet is the shortest route that achieves the source node s requirements. The destination node composes the RREP packet for the first received RREQ packet and sends it back to the source node. RREP Delivery: The RREP packet contains R, h 0, and the destination node s signature Sig D (R, TS, h 0, C m ) and certificate. This signature authenticates the hash chain and links it to the 2

4 session, and proves the destination node s approval to pay for the session, which is impotent to secure the payment. Each intermediate node signs the RREP packet s signature to authenticate itself and relays the packet after attaching its certificate. It also verifies the RREP packet s signatures to authenticate the nodes between itself and the destination node, and saves h 0 for the receipt composition. The source node receives the RREP packet containing the nodes authentication code (Auth_Code), e.g., Auth_Code = Sig W (Sig X (Sig Y (Sig Z (Sig D (R, TS, h 0, C m ))))) for the session shown in Fig. 2. This signature chain authenticates the nodes with less packet space than attaching separate signatures. This authentication process is important to make sure that the nodes are indeed participated in the session, and thus hold them accountable for the packet drop. The source node verifies the Auth_Code and the nodes certificates to make sure that the nodes meet its trust requirements. If a node lies in its residual energy, the route will be broken at this node and thus its trust value degrades. In the first data packet, the source node attaches the Auth_Code to enable the nodes to authenticate the previous nodes in the route. For example, in Fig. 2, node X authenticates D, Z, and Y from their signatures in the RREP packet and authenticates W from the Auth_Code. This signature verification process is necessary to make sure that the Auth_Code is correct and thus to ensure the receipt integrity to protect the payment. Fig. 5: Broadcasting the RREQ packets in the BAR routing protocol. 2) The BAR Routing Protocol RREQ Delivery: The RREQ packet contains ID S, ID D, TS, TTL, the route reliability field (R_reliability) that is initialized to one, and the expected number of transmitted messages (C m (S)). For the first received RREQ packet, an intermediate node A attaches its identity ID A and the number of messages it commits to relay (C m (A)), and updates R_reliability by multiplying it with its trust value. The route lifetime (R_lifetime or C m in Fig. 3) is the minimum number of messages the intermediate nodes commit to relay. Blind flooding generates few routes because each node broadcasts the RREQ once, which disables potential better routes. To solve this issue, BAR allows each node to broadcast the RREQ more than once if the R_reliability or the R_lifetime of the recently received packet is greater than those of the last broadcasted packet. For example, in Fig. 5, node M receives the first RREQ at time t 1 with R_reliability T(AB) of 0.3. At t 2, M broadcasts the packet after updating the R_reliability to be T(ABM), where T(ABM) = T(AB) T(M). At t 3, M receives the second RREQ packet for the same session with R_reliability of T(NFK) which is less than T(AB), so it discards the RREQ packet. At t 4, M receives RREQ packet with R_reliability of T(XYZW) which is larger than that of the last broadcasted packet, so it broadcasts the packet at t 5 after updating the R_reliability. Route Selection: After receiving the first RREQ packet, the destination node waits for τ D time window and keeps receiving other RREQ packets if there are, and then selects the best available route. First, the destination node excludes the routes with very low reliability. If there are multiple routes with lifetimes at least C m (S), the destination node selects the most reliable route, otherwise, the destination node establishes multiple routes with a total lifetime of C m (S) or more in such a way that reduces the routes number and maximizes the reliability. RREP Delivery: This phase is identical to that of the SRR routing protocol. V. SECURITY ANALYSIS The objectives of implementing trust in route selection are as follows: (1) To foster trust among the nodes by making knowledge about the nodes past behaviors available; (2) To encourage the nodes to provide high packet-relay success ratio and tell the truth about their residual energy by giving more preference to the highly trusted nodes in route selection; and (3) To punish the nodes that have low packet-relay success ratio because any loss of trust means loss of potential earnings. Unlike the reputation-based mechanisms that have to determine a good threshold to differentiate between the malicious and the honest nodes, with TETO, once a node s trust values fall behind those of the majority of the nodes, the node almost does not participate in the routing without the need for deciding good thresholds. The reputation-based mechanisms may not have sufficient time to judge a node s real behavior as the period of interaction with any node may be brief due to the node mobility, but TETO can monitor the nodes behaviors over long time and different sessions. Singular attackers cannot launch trust boost attacks in TETO. Credit clearance fee can be imposed to clear the payment to make fabricating sessions by colluding nodes to boost their trust expensive. For false accusation attack, the attacker has to neighbor the victim node and drop the packets intentionally to let the TP accuse its neighbor. First, neighboring a node is not easy due to the node mobility. Second, the attacker is also accused of dropping the packet, which may discourage the attack. Third, frequently launching the attack reduces its effectiveness because the attacker will be less frequently selected in routes due to its low trust. Finally, falsely accusing a node does not guarantee that this accusation will be effective because the node can improve its trust from other sessions. In free riding attack, two colluding intermediate nodes on a legitimate session manipulate the packets to add their data to communicate freely. Since the packets integrity is verified at each node, the intermediate nodes can thwart the attack by dropping the manipulated packets. The attackers may record valid packets and replay them to establish sessions under the names of others to communicate freely. A time stamp is used to thwart packet-replay attack. For receipt-manipulation-andforgery attack, the attackers try to manipulate valid receipts or forge receipts to steal credits. These attacks are not possible with using secure hash function and signature scheme because it is not possible to compute h i from h i-1 and forge the nodes signatures. Our payment model encourages node cooperation and discourages cheating actions. If the end nodes are charged only for the delivered messages, the destination node may claim that the route was broken in order not to pay. If the intermediate nodes are rewarded for relaying the undelivered messages, the colluding intermediate nodes can steal credits with consuming low resources by relaying only the security tag but not the message.

5 Fig. 6: The packet delivery ratio VS n L. Fig. 7: The number of broadcasts VS n L. Fig. 8: The network connectivity VS n L. VI. PERFORMANCE EVALUATION In our simulation, 70 nodes with 125 m transmission range are randomly deployed in 1000 m by 1000 m. n L is the number of nodes providing low packet-relay-success ratio with trust values uniformly distributed in [0.6, 0.995), but 70-n L is the number of nodes providing high packet-relay-success ratio with trust values of All the nodes start the simulation with initial energy that is sufficient for relaying 100 messages. The given results are averaged over 30 simulation runs. In each run, 300 communication sessions with randomly chosen source and destination pairs are established. The route is re-established if it is broken before sending 15 messages. The TTL is 10, and the source node s energy and trust requirements in the SRR protocol are 5 and 0.88, respectively. We do not simulate node mobility because it is already included in the trust values, i.e., if T(A) is 0.6, that means that node A drops the messages with the probability of 0.4. As we intend to study the effect of the node selection on the network performance but not the communication interface, our simulation is written in Matlab instead of NS2. The packet delivery ratio (PDR) is the number of messages received by the destination nodes to the number of messages sent by the source nodes. The PDR is a good measurement for route stability. From Fig. 6, TETO outperforms the dynamic source routing (DSR) protocol because unlike the DSR that randomly chooses the nodes, TETO makes informed routing decisions. Thus, TETO can establish more stable routes compared to the DSR. We can see that the increase of n L raises the chance of involving nodes with low trust values in routes in the DSR, but TETO can avoid these nodes and select the highly trusted nodes. Fig. 7 shows that the numbers of broadcasts in the DSR and the BAR do not depend on n L, but the increase of n L decreases the broadcasts number in the SRR because more nodes cannot satisfy the source nodes trust requirement. The BAR requires more broadcasts than the DSR because some nodes may broadcast the RREQ more than once in the BAR. In Fig. 8, the network connectivity is the number of connected routes to the total number of route establishment trials. We can see that the network connectivity in the DSR and BAR do not depend on the n L, but the increase of n L decreases the network connectivity in the SRR because more nodes cannot satisfy the source node s requirements and thus more routes cannot be established. The SRR protocol may not establish a route if the source node s requirements are not adequately decided. In order to increase the probability of establishing a route in SRR, the source node can periodically tune its requirements by learning from its past trials. VII. CONCLUSION In this paper, we have proposed TETO, a trust-based and energy-aware routing and incentive protocol for MWNs. Our protocol can make intelligent routing decisions based on the nodes past behavior and residual energy. It stimulates the nodes not only to cooperate but also to provide high packetrelay-success ratio. The simulation results demonstrate that our protocol can establish stable routes due to directing the traffic through the highly trusted nodes having sufficient energy, which can significantly improve the packet delivery ratio. Acknowledgement This work has been partially supported by a research grant from the Natural Science and Engineering Research Council (NSERC) of Canada. REFERENCES [1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, Multi-hop relay for next-generation wireless access networks, Bell Labs Technical Journal, vol. 13, no. 4, pp , [2] S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proc. of IEEE/ACM MobiCom 00, pp , Boston, MA, August 6-11, [3] S. Bansal and M. Baker, Observation-based cooperation enforcement in ad-hoc networks, Techical Report, Computer Science Department, Stanford University, CA, USA, July [4] M. Mahmoud and X. Shen, Credit-based mechanism protecting multihop wireless networks from rational and irrational packet drop, Proc. IEEE Globecom, Miami, Florida, USA, December 6-10, [5] S. Zhong, J. Chen, and R. Yang, Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks, Proc. of IEEE INFOCOM, vol. 3, pp , San Francisco, CA, March 30- April 3, [6] M. Mahmoud and X. Shen, PIS: A practical incentive system for multihop wireless networks, IEEE Transactions on Vehicular Technology, in press, [7] M. Mahmoud and X. Shen, Stimulating cooperation in multi-hop wireless networks using cheating detection system, Proc. of IEEE INFOCOM, pp , San Diego, CA, March 14 19, [8] A. Withby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, The Icfain Journal of Management Research, vol. 4, no. 2, pp , 2005.

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks BHARAT.VEERLA *1, and SREERAMA MURTHY #2 * Student, Dept of CSE, Sree Vahini Institute of Science and

More information

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks IEEE GLOBECOM 2011 - Communication & System Security 1 SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks Mohamed Elsalih Mahmoud, Mrinmoy Barua, and Xuemin (Sherman) Shen Department

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 RACE for Multihop Wireless Networks Suganya.S 1, Janani.S 2 1 PG Scholar, Department of Computer Science and Engineering, SreeSastha Institute of Engineering and Technology 2 Assistant Professor, Department

More information

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-87-91 ISSN: 2249-6645 Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks

More information

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 1 Mohamed M. E. A. Mahmoud 1, Xiaodong Lin 2, and Xuemin (Sherman) Shen 1, Fellow, IEEE 1 Department of Electrical and

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

IN multihop wireless networks (MWNs), the traffic originated

IN multihop wireless networks (MWNs), the traffic originated IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013 209 A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Mohamed M.E.A.

More information

ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks

ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks Mohamed Elsalih Mahmoud, and Xuemin (Sherman) Shen, IEEE Fellow Abstract In multi-hop wireless

More information

Trust Centric Stable Routing For Wireless Mesh Networks

Trust Centric Stable Routing For Wireless Mesh Networks Received: August 6, 2017 145 Trust Centric Stable Routing For Wireless Mesh Networks Navamani Thandava Meganathan 1 * 1 Department of Computational Intelligence, School of Computer Science and Engineering,

More information

A Light Weight Payment Report Scheme for Multihop Wireless Networks

A Light Weight Payment Report Scheme for Multihop Wireless Networks A Light Weight Payment Report Scheme for Multihop Wireless Networks S. Suganya, Department of CSE(PG Scholar), Kathir College of Engineering, Neelambur,Coimbatore. Dr. M. Sadish Sendil, Head of the Department

More information

Cooperation in Mobile Ad Hoc Networks

Cooperation in Mobile Ad Hoc Networks Cooperation in Mobile Ad Hoc Networks Jiangyi Hu Computer Science Department Florida State University January 11, 2005 Abstract In this report we consider selfish node behavior in ad hoc networks and discuss

More information

A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS

A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS Hamsha1, Dr.Nagaraj2 Research Scholar 1, 1 Professor & Head of the Department,Computer Science,RVCE Bangalore ABSTRACT

More information

AN AD HOC NETWORK is a group of nodes without requiring

AN AD HOC NETWORK is a group of nodes without requiring 2260 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 12, DECEMBER 2005 Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks Wei Yu, Student Member, IEEE, and K. J. Ray

More information

Cooperation and Accounting Strategy for Multi-hop Cellular Networks

Cooperation and Accounting Strategy for Multi-hop Cellular Networks Cooperation and Accounting Strategy for Multi-hop Cellular Networks Attila Weyland Torsten Braun {weyland braun}@iam.unibe.ch Institute of Computer Science and Applied Mathematics University of Bern Neubrückstrasse

More information

Malicious Node Detection in MANET

Malicious Node Detection in MANET Malicious Node Detection in MANET Sujitha.R 1, Dr.Thilagavathy.D 2 PG scholar, Dept. of Computer Science & Engineering, Adhiyamaan engineering college, Hosur, India 1 Professor, Dept. of Computer Science

More information

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L International Journal of Scientific & Engineering Research, Volume 1, Issue 3, December-2010 1 Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V,

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Mitigating Routing Misbehavior in Mobile Ad Hoc Networks S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in The 6th ACM International Conference on Mobile

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network K. Aravindha 1, A. Senthil Kumar 2 Research Scholar, Asst. Professor, Dept. of Computer Science, Tamil university,

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

An incentive based approach to detect selfish nodes in Mobile P2P network

An incentive based approach to detect selfish nodes in Mobile P2P network Scholars' Mine Masters Theses Student Research & Creative Works Spring 2011 An incentive based approach to detect selfish nodes in Mobile P2P network Hemanth Meka Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses

More information

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks 1 Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks Tiranuch Anantvalee and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Nagarajan Ravi #, Jeyanthi. P *2 # Department of Information Technology, Sathyabama University,

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:  Volume 4, Issue VI, June 2016 ISSN SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile

More information

An Improvement to Mobile Network using Data Mining Approach

An Improvement to Mobile Network using Data Mining Approach An Improvement to Mobile Network using Data Mining Approach Sumiti Dahiya M.Phil (CS) MM University, Mulana, Ambala, Haryana (India) sumitidahiya604@gmail.com Abstract Secure communication is always the

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Security Enhancement

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

An Efficient and Secured way of Routing in Hybrid WSN

An Efficient and Secured way of Routing in Hybrid WSN An Efficient and Secured way of Routing in Hybrid WSN Aswani Raj N P 1, Kiran V K 2 P G Student, Computer Science & Engineering, NSS College of Engineering, Palakkad, India 1 Assistant Professor, Computer

More information

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018 56 Securing Against Collaborative Blackhole Attack in Wireless Ad-Hoc Network Mr. Deepesh Dilip Jagdale, Mr. Siddhesh

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Multipath Routing Based Secure Data Transmission in Ad Hoc Networks

Multipath Routing Based Secure Data Transmission in Ad Hoc Networks Multipath Routing Based Secure Data Transmission in Ad Hoc Networks Li Zhao and José G. Delgado-Frias School of Electrical Engineering and Computer Science Washington State University Pullman, WA 9964-2752,

More information

SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks

SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks Qi He Dapeng Wu Pradeep Khosla Carnegie Mellon University, Dept. of Electrical & Computer Engineering, Pittsburgh, PA

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs

An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs By: Kejun Liu, Jing Deng, Pramod K. Varshney, and Kashyap Balakrishnan K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan,

More information

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Pietro Michiardi and Refik Molva Piero.Michiardi@eurecom.fr Refik.Molva@eurecom.fr Institut Eurécom, 2229 Route des Crêtes BP 193

More information

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Monty Barber 21 April 2003 CSC774 Network Security Overview Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network

A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network M.MADHUMATHI, S. Sindhuja Department of Computer Science & Engineering, SNS College of Engineering, Coimbatore, INDIA.

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion ABSTRACT Communication is usually done through means of network where there is a lot of intrusion included to it. In order to detect the misbehavior, there should an effective strategy, which is capable

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance

More information

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (1): 155-159 Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016) jeteas.scholarlinkresearch.org Journal of Emerging

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

A Survey on Finding Selfish Nodes in Mobile Ad Hoc Networks

A Survey on Finding Selfish Nodes in Mobile Ad Hoc Networks A Survey on Finding Selfish Nodes in Mobile Ad Hoc Networks J.Vijithanand, K.Sreerama Murthy Department of Information Technology Sreenidhi Institute of science & Technology Hyderabad-India Abstract--

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Secure routing in ad hoc and sensor networks

Secure routing in ad hoc and sensor networks Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security

More information

Incentives for P2P File Sharing in Mobile Ad Hoc Networks

Incentives for P2P File Sharing in Mobile Ad Hoc Networks Incentives for P2P File Sharing in Mobile Ad Hoc Networks Afzal Mawji and Hossam Hassanein Telecommunications Research Lab, School of Computing, Queen s University Kingston, Ontario, K7L 3N6, Canada. {mawji,

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks

PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks Dong Lu 1 Dept. of Computer Science Northwestern University Evanston, IL 60201, USA donglu@cs.northwestern.edu Haitao Wu, Qian Zhang,

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(3): 201-205, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: September 23, 2011 Accepted: November 02, 2011 Published:

More information

DETECTION AND ISOLATION OF PACKET DROPPERS IN WIRELESS AD-HOC NETWORKS

DETECTION AND ISOLATION OF PACKET DROPPERS IN WIRELESS AD-HOC NETWORKS DETECTION AND ISOLATION OF PACKET DROPPERS IN WIRELESS AD-HOC NETWORKS by Yu Zhang A Thesis Submitted to the Faculty of the DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING In Partial Fulfillment of the

More information

Comparison of Incentive-based Cooperation Strategies for Hybrid Networks

Comparison of Incentive-based Cooperation Strategies for Hybrid Networks Comparison of Incentive-based Cooperation Strategies for Hybrid Networks Attila Weyland, Thomas Staub, and Torsten Braun University of Bern Institute of Computer Science and Applied Mathematics Neubrückstrasse

More information

Avoiding Blackhole Attacks Using CBDA Approach in MANETS

Avoiding Blackhole Attacks Using CBDA Approach in MANETS Avoiding Blackhole Attacks Using CBDA Approach in MANETS Aurhors- Ms.Shireen S, Mr.Kiranbabu T S, Assit.prof. Abstract: In mobile ad hoc networks the main requirement is building the connection between

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs

A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs Saeed K. Saeed Noureldien A. Noureldien Department of Computer Science University of Science and Technology

More information

Improving the Performance of Wireless Ad-hoc Networks: Accounting for the Behavior of Selfish Nodes

Improving the Performance of Wireless Ad-hoc Networks: Accounting for the Behavior of Selfish Nodes IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2011 (2011), Article ID 413976, 11 pages DOI: 10.5171/2011.413976 Improving the Performance

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

SRPS: Secure Routing Protocol for Static Sensor Networks

SRPS: Secure Routing Protocol for Static Sensor Networks SRPS: Secure Routing Protocol for Static Sensor Networks Hamoinba Vebarin and Samourqi Difrawi International Awarness Institute Email: {hvebarin, sdifrawi}@iwi.org.jp Abstract In sensor networks, nodes

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Defense Against Packet Injection in Ad Hoc Networks

Defense Against Packet Injection in Ad Hoc Networks Defense Against Packet Injection in Ad Hoc Networks Qijun Gu 1 Peng Liu 2 Chao-Hsien Chu 2 Sencun Zhu 3 1 Department of Computer Science Texas State University, San Marcos, TX 78666 2 School of Information

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

High Throughput in MANET Using relay algorithm and rebroadcast probability

High Throughput in MANET Using relay algorithm and rebroadcast probability RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks

MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks C. H Widanapathirana, Student Member IEEE, Bok-Min Goi, Sim Moh Lim, Member IEEE Abstract Community Wireless

More information

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1 Shouhuai Xu 2 Sanjeev Setia 1 Sushil Jajodia 1,3 1 Center for Secure Information Systems, George Mason University,

More information

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 8 (August 2017), PP.46-51 A Novel Approach To Detect Trustworthy Nodes

More information

SMTCI: Secure Multi-Trial Trust Evaluation and Cost- Effective Incentive Mechanism for Multi-Hop Cellular Networks

SMTCI: Secure Multi-Trial Trust Evaluation and Cost- Effective Incentive Mechanism for Multi-Hop Cellular Networks SMTCI: Secure Multi-Trial Trust Evaluation and Cost- Effective Incentive Mechanism for Multi-Hop Cellular Networks B.Sumathi 1, V.Hamsadhwani 2 1 M.Tech Scholar, Department of Information Technology Periyar

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

CLUSTER BASED MAC LAYER ROUTING AND MISBEHAVIOR DETECTION FOR MOBILE AD HOC NETWORKS

CLUSTER BASED MAC LAYER ROUTING AND MISBEHAVIOR DETECTION FOR MOBILE AD HOC NETWORKS CLUSTER BASED MAC LAYER ROUTING AND MISBEHAVIOR DETECTION FOR MOBILE AD HOC NETWORKS M.Anitha 1, Dr.Rani V.G 2 1 Research Scholar, 2 Associate Professor, Department of Computer Science Sri Ramakrishna

More information

Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network Journal of Computer Science 2012, 8 (11), 1914-1923 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1914.1923 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) Random Dummy Packet Distribution

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

Survey on Different Watchdog Systems to Deal with Selfish Nodes In MANETs

Survey on Different Watchdog Systems to Deal with Selfish Nodes In MANETs Survey on Different Watchdog Systems to Deal with Selfish Nodes In MANETs Anju Markose, Asst. Prof. Vidhya P.M Final Year M Tech Degree Dept. of Computer Science & Engineering Sree Narayana Gurukulam College

More information

Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN

Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN Wireless Sensor Network, 2014, 6, 237-248 Published Online November 2014 in SciRes. http://www.scirp.org/journal/wsn http://dx.doi.org/10.4236/wsn.611023 Detection of Insider Selective Forwarding Attack

More information

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET Payal J. Desai 1, Urmi Desai 2 1 P.G.Student, 2 Prof., CO Department, Sarvajanik College of Engineering and Technology, Surat, India. Email:

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols

More information