IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 2, February 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Agent-Based Approach To Nodes’ Misbehaviour Detection In Mobile Ad-Hoc Networks

[Full Text]

 

AUTHOR(S)

Otor Samera U., Akinyemi Bodunde O., Adekunle Adeyelu., Akumba Beatrice O., Aderounmu Ganiyu A.

 

KEYWORDS

MANET, Misbehaviour, Mobile agents.

 

ABSTRACT

Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks (MANETs) are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work, a Mobile Agent-Based Acknowledgement scheme (MAACK) was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol (IP) address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 (NS-3) and results benchmarked with an existing scheme; the Enhanced Adaptive Acknowledgment (EAACK) using packet delivery ratio, routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio, lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

 

REFERENCES

[1] P. S. Neelavathy and D. Sridharan. “A Performance Comparison and Evaluation of Analysing Node Misbehaviour in MANET using Intrusion Detection System.” International Journal of Computer Science and Engineering Technology ( IJCSET). February 2011, pp.35-40.

[2] L. Buttyán and J. Hubaux J. “Stimulating cooperation in self-organizing mobile ad hoc networks. “Journal of Mobile Networks and Applications, vol 8 no. 5, October 2003. pp 579 – 592, 2003

[3] S. Zhong, J. Chen. and Y. R.Yang. “ Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks.” IEEE INFOCOM., pp.1987–1997, 2003

[4] Y. Younghwan, S. Ahn and D. Agrawal. “Impact of a simple load balancing approach and an incentive-based scheme on MANET performance.” Elsevier Journal of Parallel and Distributed computing. Vol. 70 no. 2 pp 71-83, 2010

[5] E.C. Dimitris, D.G. Konstantinos and P. Athanasios. “ICARUS: hybrid inCentive mechAnism for coopeRation stimUlation in ad hoc networkS”. Elsevier journal of Ad Hoc Networks. Vol. 10 no. 6 pp 976–989, 2012

[6] J. Hamed, K. Fayazbakhsh, B. Bakhshi and M. Dehghan. “A Novel Incentive-Based and Hardware-Independent Cooperation Mechanism for MANETs.” In: IEEE Communication society in the WCNC 2008 proceedings., pp.1525-3511, 2008

[7] Y. Guo, J. Ma, C. Wang and K. Yang. “Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.” International Journal of Distributed Sensor Networks (IJDCN). pp.1-13, 2013

[8] S. Hungmin, C. Chen Chiunghsun, and Y. Ku. “A novel acknowledgment-based approach against collude attacks in MANET”. Elsevier journal of Expert Systems with Applications. Vol 39, pp.7968–7975.

[9] S. Marti, T.J. Giuli, K. Lai and M. Baker, (2000). “Mitigating routing misbehaviour in mobile ad hoc networks.” In: Proceedings of the 6th annual international conference on Mobile computing and networking. Boston, Massachusetts: ACM. pp 255-265, 2000

[10] S, Buchegger, . and J.L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation of Nodes-fairness in dynamic ad-hoc networks”. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &computing. New York, USA. pp 226 - 236 , 2002

[11] L. Kejun, D. Jing , K.V. Pramod and B. Kashyap. “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”. IEEE Transactions on Mobile Computing. Vol. 6 no. 5 pp.488-502, 2007

[12] N. Kang, E. Shakshuki and T. Sheltami. “Detecting Misbehaving Nodes in MANETs.” In the proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services .Paris, France, ACM, pp.216-222, 2010
[13] N. Kang, E. Shakshuki and T. Sheltami. "Detecting Forged Acknowledgements in MANETs”. In proceedings of the IEEE International Conference on Advanced Information Networking and Applications. pp.488-494, 2011

[14] S. K. Muhammad, M. Daniele, I. K. Majid and B. Elisa. “ Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation”. Trustcom/BigDataSE/ISPA, 2015 IEEE DOI: 10.1109/Trustcom.2015.439 . USA: IEEE Xplore., 2015

[15] L. Ming, S. Sergio, L. Pan and S. Jinyuan. “MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense”. IEEE Transactions on Mobile Computing Vol.14, no. 6 , pp 1203 – 1217, 2015