Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Stimulating Node Cooperation in Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Cooperative black and gray hole attacks in mobile ad hoc networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Struggling against selfishness and black hole attacks in MANETs
Wireless Communications & Mobile Computing
Merkle Tree Traversal Revisited
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Attack-resistant cooperation stimulation in autonomous ad hoc networks
IEEE Journal on Selected Areas in Communications
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
In multi-hop wireless ad hoc networks, the packets are forwarded through intermediate nodes along the source-destination path. Without having any control on packets forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. The dropper motivation is the preservation of its resources, like its limited energy (selfish behavior) or the launch of denial of service attack (malicious behavior). In this paper, we propose an approach to verify the correct forwarding of packets by an intermediate node. The Merkle tree principle has been used for implementation in justification of our proposed approach. Through simulation, we have shown our approach efficiency, and we have evaluated its performance in both proactive and reactive routing protocol in ad hoc network. Also, we have compared our approach with the watchdog and the 2-hop ACK which are well-known approaches in the literature.