AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS

Ashish Kumar1*, Vidya Kadam2*, Subodh Kumar3, Shital Pawar4*
1Department of Computer Science, Bharati Vidyapeeth University, College of Engg. Pune, (BVUCOE), Pune, India
2Department of Computer Science, Bharati Vidyapeeth University, College of Engg. Pune, (BVUCOE), Pune, India
3Department of Computer Science, Bharati Vidyapeeth University, College of Engg. Pune, (BVUCOE), Pune, India
4Department of Computer Science, Bharati Vidyapeeth University, College of Engg. Pune, (BVUCOE), Pune, India
* Corresponding Author : shtlpwr16@gmail.com

Received : -     Accepted : -     Published : 15-12-2011
Volume : 1     Issue : 1       Pages : 4 - 6
Int J Adv Embed Syst 1.1 (2011):4-6

Cite - MLA : Ashish Kumar, et al "AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS." International Journal of Advances in Embedded Systems 1.1 (2011):4-6.

Cite - APA : Ashish Kumar, Vidya Kadam, Subodh Kumar , Shital Pawar (2011). AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS. International Journal of Advances in Embedded Systems, 1 (1), 4-6.

Cite - Chicago : Ashish Kumar, Vidya Kadam, Subodh Kumar , and Shital Pawar "AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETS." International Journal of Advances in Embedded Systems 1, no. 1 (2011):4-6.

Copyright : © 2011, Ashish Kumar, et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

We are considering the Routing misbehaviour in MANETs (Mobile Ad Hoc Networks). Routing protocols for MANETs are based on the assumption which are, all participating nodes are fully cooperative. But, due to the open structure node misbehaviors may exist. One such routing misbehavior is that some nodes will take part in the route discovery and maintenance processes but refuse to forward data packets. In this, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their effect. The basic idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. To reduce extra routing overhead, only a few of the received data packets are acknowledged in the 2ACK scheme.

References

[1] L.M. Feeney and M. Nilsson. Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment, Proc. IEEE INFOCOM, 2001: Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 3 (2001), Pages. 1548- 1557, Year of Publication: 2007  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) in 10th IEEE International Conference, 27-30 Aug 2002,Year of Publication :2002, ICON 2002  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] K. Balakrishnan, J. Deng, and P.K. Varshney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks , Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005,Volume 4,Pages 2137-2142, IEEE Press 2005,Year of Publication:2005  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’01), 2001  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Elizabeth Royer and C-K Toh: A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine, pages 46-55, April 1999  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Josh Broch , David A. Maltz , David B. Johnson , Yih-Chun Hu , Jorjeta Jetcheva , A performance comparison of multi-hop wireless ad hoc network routing protocols, Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, p.85-97, October 25-30, 1998, Dallas, Texas, United States [doi>10.1145/288235.288256].  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers, ACM SIGCOMM Computer Communication Review, v.24 n.4, p.234-244, Oct. 1994  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] J.J. Garcia-Luna-Aceves et all: Source Tree Adaptive Routing (STAR) protocol, draft-ietf-manet-star-00.txt, 1998, IETF Internet Draft  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Charles E. Perkins , Elizabeth M. Royer, Ad-hoc On-Demand Distance Vector Routing, Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, p.90, February 25-26, 1999  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[10] David B. Johnson, David A. Maltz: Dynamic Source Routing (DSR) in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus