Proceedings of the second ACM conference on Wireless network security
Packet-dropping adversary identification for data plane security
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
International Journal of Communication Networks and Distributed Systems
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Outlier detection using naïve bayes in wireless ad hoc networks
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Inspired Social Spider Behavior for Secure Wireless Sensor Networks
International Journal of Mobile Computing and Multimedia Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.