Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Ad Hoc Networking
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Mobile Ad-hoc Networks (MANETs) is an emerging area with practical applications. An ad-hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. However, routing security in MANETs appears to be a problem due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Existing routing protocols for MANETs have better network performance but fail to identify the presence of malicious nodes. In this paper, we propose a Resiliency Oriented Secure (ROS) routing protocol which includes a detection phase to identify the presence of malicious in the network. In this routing algorithm, nodes suspect the routing packets from other nodes based on number of updates field in their neighbors table, and confirm it by sending check request packets to their previous hop neighbors. On receiving positive or negative acknowledgement from previous hop neighbors, nodes either update or discard the control packet. In this way the participating nodes eliminate the malicious routing behavior successfully. Since ROS protocol does not employ any cryptographic techniques in the process of route discovery, it improves the performance of network in terms of control overhead, route acquisition time and saves the power of participating nodes.