Detection of Routing Misbehavior in MANETs
S. D. Khatawkar
1
, U. L. Kulkarni
2
and K. K. Pandyaji
3+
1
ADCET, Ashta,
2
KGCET, Karjat,
3
ADCET, Ashta.
Abstract: This paper highlights routing misbehavior in MANETs (Mobile Ad Hoc Networks). In general,
routing protocols for MANETs are designed based on the assumption that all participating nodes are fully
cooperative. However, due to the open structure and scarcely available battery-based energy, node
misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route
discovery and maintenance processes but refuse to forward data packets.
In this paper, different schemes are to be discussed that serves as an add-on technique to detect routing
misbehavior and to mitigate their adverse effect.
Keywords: Mobile Ad Hoc Networks (MANETs), routing misbehaviour, node misbehaviour, network
security, Dynamic Source Routing (DSR), Trusted Credit Clearance Service ( TCCS).
1. Introduction
MANETs are two types: closed and open. In a closed MANET, all mobile nodes cooperate with each
other toward a common goal, such as emergency search/rescue or military and law enforcement operations.
In an open MANET, different mobile nodes with different goals share their resources in order to ensure
global connectivity. However, some resources are consumed quickly as the nodes participate in the network
functions. For instance, battery power is considered to be most important in a mobile environment. An
individual mobile node may attempt to benefit from other nodes, but refuse to share its own resources. Such
nodes are called selfish or misbehaving nodes, and their behaviour is termed selfish or misbehaviour. One of
the major sources of energy consumption in mobile nodes of MANETs is wireless transmission. A selfish
node may refuse to forward data packets for other nodes in order to conserve its own energy.
2. Related Schemes
The security problem and the misbehaviour problem of wireless networks including MANETs have been
studied by many researchers. Various techniques have been proposed to prevent selfishness in MANETs.
These schemes can be broadly classified into two categories: Credit-based schemes and Reputation-based
schemes.
2.1 The Packet Purse Model (PPM)
In this model, the originator of charge is distributed among the forwarding terminal nodes in the
following way: When sending the packet, the originator loads it with a number of beans sufficient to reach
the destination Each forwarding terminal node acquires one or several beans from the packet and thus,
increases the stock of its beans, The number of beans depends on the direct connection on which the packet
is forwarded (long distance requires more beans). If a packet does not have enough beans to be forwarded,
then it is discarded. Packet forwarding in the Packet Purse Model is illustrated in Figure 1. The basic
+
shriharikhatawkar@gmail.com
2011 International Conference on Computer and Software Modeling
IPCSIT vol.14 (2011) © (2011) IACSIT Press, Singapore
162