Online citations, reference lists, and bibliographies.

Detection Of Packet Forwarding Misbehavior In Mobile Ad-Hoc Networks

O. Gonzalez, M. Howarth, G. Pavlou
Published 2007 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. We present evaluation results that demonstrate the operation of our algorithm in mobile ad hoc environments and show that it effectively detects nodes that drop a significant fraction of packets.
This paper references
10.1109/JSAC.2005.861392
Secure data communication in mobile ad hoc networks
Panos Papadimitratos (2006)
10.1145/570681.570683
Self-organized network-layer security in mobile ad hoc networks
H. Yang (2002)
10.1109/GLOCOM.2003.1258776
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
Rajesh N. Rao (2003)
10.1109/SECPRI.2000.848446
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig (2000)
10.17487/RFC3561
Ad hoc On-Demand Distance Vector (AODV) Routing
C. Perkins (2003)
Maca - a new channel access method for packet radio
P. Kam (1990)
10.1145/513800.513828
Performance analysis of the CONFIDANT protocol
S. Buchegger (2002)
10.1109/ICNP.2001.992905
Providing robust and ubiquitous security support for mobile ad-hoc networks
J. Kong (2001)
10.1145/570681.570682
Securing ad hoc routing protocols
Manel Guerrero Zapata (2002)
10.1109/JSAC.2005.861388
A framework for misuse detection in ad hoc networks- part II
D. Subhadrabandhu (2006)
Secure ad hoc on-demand distance vector (saodv) routing
M. Guerrero (2001)
10.1145/501436.501437
The quest for security in mobile ad hoc networks
J. Hubaux (2001)
10.1145/190314.190336
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
C. Perkins (1994)
10.1145/570681.570684
An on-demand secure routing protocol resilient to byzantine failures
B. Awerbuch (2002)
10.1016/S1570-8705(03)00019-2
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
Y. Hu (2003)
10.1145/345910.345955
Mitigating routing misbehavior in mobile ad hoc networks
S. Marti (2000)
Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
Manel Guerrero Zapata (2006)
10.1109/JSAC.2005.861387
A framework for misuse detection in ad hoc Networks-part I
D. Subhadrabandhu (2006)
The dynamic source routing protocol for mobile ad-hoc networks
J. Broach (1998)
10.1007/s11276-004-4744-y
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
Y. Hu (2005)
10.1109/ICNP.2002.1181388
A secure routing protocol for ad hoc networks
K. Sanzgiri (2002)
10.1016/S1570-8705(03)00018-0
Secure message transmission in mobile ad hoc networks
Panos Papadimitratos (2003)
10.1109/65.806983
Securing ad hoc networks
L. Zhou (1999)
10.1109/SECPRI.1998.674828
Detecting disruptive routers: a distributed network monitoring approach
K. A. Bradley (1998)
10.1201/9781420013610.CH16
Secure Routing for Mobile Ad Hoc Networks
Joo-Han Song (2006)
10.1109/JSAC.2005.861384
SCAN: self-organized network-layer security in mobile ad hoc networks
H. Yang (2006)
10.1145/190314.190334
MACAW: a media access protocol for wireless LAN's
V. Bharghavan (1994)
10.1109/MCSA.1999.749281
Ad-hoc on-demand distance vector routing
C. Perkins (1999)



This paper is referenced by
10.1007/978-981-15-1480-7_68
A Survey of IDS Techniques in MANETs Using Machine-Learning
Mohammed Shabaz Hussain (2020)
Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
Sukla Banerjee (2008)
10.5121/IJWMN.2011.3519
A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network
Himadri Nath Saha (2011)
A Review on Gray Hole Attack in MANETs
Sandeep Kumar (2014)
10.1109/WOWMOM.2009.5282475
Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks
Y. Ren (2009)
10.1007/s11047-010-9219-8
Priming: making the reaction to intrusion or fault predictable
Martin Drozda (2010)
10.1007/978-981-10-6005-2_39
Packet Delay Prediction in MANET Using Artificial Neural Network
Harshita Tuli (2018)
On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks
Tanapat Anusas-Amornkul (2008)
Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks
V. Koo (2013)
10.1109/ICC.2009.5198910
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
Thaier Hayajneh (2009)
10.1007/978-3-642-24037-9_60
Fidelity Index Based on Demand (FBOD) Secure Routing in Mobile Ad Hoc Network
Himadri Nath Saha (2011)
10.5120/18978-0394
A Review on Delay Prediction Techniques in MANET
Harshita Tuli (2014)
10.1109/INMIC.2012.6511441
Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs
M. Hussain (2012)
ADVANCED IMPLEMENTATION OF ENHANCED-AODV TO DETECT PASSIVE BASED INTRUSION DETECTION ATTACKS IN WIRELESS AD HOC NETWORKS
V. P. Krishna Anne (2017)
A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV routing protocol in
Onkar V. Chandure (2011)
Review of Security Approaches in Routing Protocol in Mobile Adhoc Network
Sumati Ramakrishna Gowda (2013)
10.14569/SPECIALISSUE.2011.010205
Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network
Himadri Nath Saha (2011)
RELIABLE REAL-TIME DATA TRANSMISSION IN MANET USING CONNECTION POSSIBILITY
P. Sivakumar (2013)
10.1145/3128128.3128162
Study of security in MANETs and evaluation of network performance using ETX metric
Fatna El Mahdi (2017)
10.5120/15185-3541
Watchdog: A Study on Examining and Eliminating Misbehaviour
Saurabh Bora (2014)
10.5120/IJCA2019919105
A Literature Survey on Intrusion Detection System in Manets using Machine Learning Techniques
Tarik Fouad (2019)
10.7753/IJCATR0203.1016
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS - A REVIEW
Kusum Lata (2013)
10.1145/1454586.1454604
Using context information to evaluate cooperativeness
F. Klan (2008)
FRENSA: Farthest, Reliable and Efficient Node Selection Al- gorithm for Mobile Ad-hoc Networks (MANETs)
Komal Kumar Bhatia (2010)
10.1016/j.jnca.2018.01.004
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
G. Liu (2018)
10.1145/2659651.2659657
Non-cryptographic Detection Approach and Countermeasure for JFDV Attack
Avani Sharma (2014)
On Demand Secure Routing in Mobile Ad-hoc Network Based on Fidelity
Mrs. Meenakshi Bansal (2012)
A Novel Schema for Detecting Malicious Packet Losses
M. K. Kumar (2012)
10.1007/978-3-540-75694-1_6
Fault Detection in Autonomic Networks Using the Concept of Promised Cooperation
R. Badonnel (2007)
10.1109/ICOEI.2018.8553857
Secure DSR Routing from Malicious Node by PGP Encryption
Milan Kumar Dholey (2018)
Evaluation of Gray Hole Attack in Mobile Ad-hoc Network and proposed Solution
S. Kumar (2014)
Secure Routing Schema for Manet with Probabilistic Node to Node forwarding
Sumati Ramakrishna Gowda (2013)
See more
Semantic Scholar Logo Some data provided by SemanticScholar