Detection of Routing Misbehavior in MANETs S. D. Khatawkar 1 , U. L. Kulkarni 2 and K. K. Pandyaji 3+ 1 ADCET, Ashta, 2 KGCET, Karjat, 3 ADCET, Ashta. Abstract: This paper highlights routing misbehavior in MANETs (Mobile Ad Hoc Networks). In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, different schemes are to be discussed that serves as an add-on technique to detect routing misbehavior and to mitigate their adverse effect. Keywords: Mobile Ad Hoc Networks (MANETs), routing misbehaviour, node misbehaviour, network security, Dynamic Source Routing (DSR), Trusted Credit Clearance Service ( TCCS). 1. Introduction MANETs are two types: closed and open. In a closed MANET, all mobile nodes cooperate with each other toward a common goal, such as emergency search/rescue or military and law enforcement operations. In an open MANET, different mobile nodes with different goals share their resources in order to ensure global connectivity. However, some resources are consumed quickly as the nodes participate in the network functions. For instance, battery power is considered to be most important in a mobile environment. An individual mobile node may attempt to benefit from other nodes, but refuse to share its own resources. Such nodes are called selfish or misbehaving nodes, and their behaviour is termed selfish or misbehaviour. One of the major sources of energy consumption in mobile nodes of MANETs is wireless transmission. A selfish node may refuse to forward data packets for other nodes in order to conserve its own energy. 2. Related Schemes The security problem and the misbehaviour problem of wireless networks including MANETs have been studied by many researchers. Various techniques have been proposed to prevent selfishness in MANETs. These schemes can be broadly classified into two categories: Credit-based schemes and Reputation-based schemes. 2.1 The Packet Purse Model (PPM) In this model, the originator of charge is distributed among the forwarding terminal nodes in the following way: When sending the packet, the originator loads it with a number of beans sufficient to reach the destination Each forwarding terminal node acquires one or several beans from the packet and thus, increases the stock of its beans, The number of beans depends on the direct connection on which the packet is forwarded (long distance requires more beans). If a packet does not have enough beans to be forwarded, then it is discarded. Packet forwarding in the Packet Purse Model is illustrated in Figure 1. The basic + shriharikhatawkar@gmail.com 2011 International Conference on Computer and Software Modeling IPCSIT vol.14 (2011) © (2011) IACSIT Press, Singapore 162