Browse > Article
http://dx.doi.org/10.3837/tiis.2015.12.023

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs  

Heydari, Vahid (Department of Electrical and Computer Engineering, The University of Alabama in Huntsville)
Yoo, Seong-Moo (Department of Electrical and Computer Engineering, The University of Alabama in Huntsville)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.12, 2015 , pp. 5150-5169 More about this Journal
Abstract
Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).
Keywords
Mobile ad hoc networks (MANETs); acknowledgment; random access MAC; misbehaving node; blackhole attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, 2007. Article (CrossRef Link)   DOI
2 S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” in Proc. of MobiCom, pp. 255–265, 2000. Article (CrossRef Link)
3 A. A. Pirzada, A. Datta, and C. McDonald, “Incorporating trust and reputation in the DSR protocol for dependable routing,” Computer Communications, vol. 29, no.15, pp. 2806–2821, 2006. Article (CrossRef Link)   DOI
4 M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs,” IEEE Trans. Ind. Electron., vol. 60, no. 3, pp. 1089–1098, 2013. Article (CrossRef Link)   DOI
5 K. Xu, M. Gerla, and S. Bae, “How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks,” in Proc. 2002 IEEE GLOBECOM, pp. 72–76, Nov. 2002. Article (CrossRef Link)
6 H. M. Sun, C. H. Chen, and Y. F. Ku, “A novel acknowledgment-based approach against collude attacks in MANET,” Expert Systems with Applications, vol. 39, no. 9, pp. 7968–7975, 2012. Article (CrossRef Link)   DOI
7 E. Winjum, P. Spilling, and O. Kure, “Trust Metric Routing to Regulate Routing Cooperation in Mobile Wireless Ad Hoc Networks,” in Proc. of Wireless Conference 2005-European wireless, pp. 1–8, 2005. Article (CrossRef Link)
8 H.Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks,” Ad Hoc Networks, vol. 11, no. 7, pp. 2096–2114, 2013. Article (CrossRef Link)   DOI
9 A.C.-C. Yao and Y. Zhao, “Online/Offline Signatures for Low-Power Devices,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 283–294, 2013. Article (CrossRef Link)   DOI
10 B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks,” ACM Trans. Inf. Syst. Secur., vol. 10, no. 4,pp. 1–35 , Jan. 2008. Article (CrossRef Link)   DOI
11 K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” in Proc. of IEEE WCNC, pp. 2137-2142, 2005. Article (CrossRef Link)
12 R.V. Boppana and X. Su, “On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Comput., vol. 10, no. 8, pp. 1162–1174, 2011. Article (CrossRef Link)   DOI
13 V. Heydari, and S.M. Yoo, “Mean Number of Hops in Flooding-Based Ad Hoc Networks,” Submitted to Inf. Process. Lett.,2015
14 S. Buchegger and J. Y. Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes: Fairness in dynamic ad-hoc networks,” in Proc. of MobiHOC, pp. 226–236, 2002. Article (CrossRef Link)
15 C. Chang, J. Lin, and F. Lai, “Trust-group-based authentication services for mobile ad hoc networks,” in Proc. of ISWPC ’06, pp. 37–40, 2006. Article (CrossRef Link)
16 T. Chen, O. Mehani, and R. Boreli, “Trusted routing for VANET,” in Proc. of ITST ’09, pp. 647–652, 2009. Article (CrossRef Link)
17 R. Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling,” Wiley- Interscience, New York, 1991. Article (CrossRef Link)
18 T. Krovetz, “RFC 4418: UMAC: Message Authentication Code using Universal Hashing,” 2006. Article (CrossRef Link)