Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  E2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks Using OLSR Protocol  
  Authors : Farha Nausheen; Sayyada Hajera Begum
  Cite as:

 

The network topology of MANETs changes rapidly and unpredictably and due to the changing topology packet loss is a common phenomenon. Routing protocols used in MANETs are based on the assumption that, all participating nodes will be fully cooperative. But, due to the open structure node misbehavior may exist and packet loss occurs. Among them one type of misbehavior is that some nodes will take part in route establishment processes but they do not respond to forward data packets and simply dismiss the packets. The 2ACK scheme has a higher routing overhead which is caused by the transmission of 2ACK packets. So by reducing the acknowledgment ratio, Rack, the number of 2ACK transmissions can be significantly lowered. The ENHANCED 2ACK scheme is immune to the limited overhearing range issue caused due to low transmission power in the communication link. It solves the problem of ambiguous collisions, receiver collisions, and limited transmission power.

 

Published In : IJCSN Journal Volume 4, Issue 1

Date of Publication : February 2015

Pages : 90 - 96

Figures : 10

Tables : --

Publication Link : E2ACK: Preventing Routing Misbehavior in Mobile Ad hoc Networks Using OLSR Protocol

 

 

 

Ms. Farha Nausheen : graduated in Information Technology in 2007 from Muffakham Jah College of Engineering and Technology and did her M.Tech in Computer Science in 2012 from the same college. She is currently Asst. Professor in the Dept of IT, Muffakham Jah College of Engg. & Technology since 2008. She is a member of Association for Computer Machinery (ACM). Her areas of interest are Digital Electronics, Data Structures, and Computer Networks.

Ms. Sayyada Hajera Begum : graduated in Information Technology from Muffakham Jah College of Engineering and Technology and did her M.Tech from Jawaharlal Nehru Technological University, Hyderabad. She is currently Asst. Professor in the Dept of IT, Muffakham Jah College of Engg. & Technology since 2007. She is a member of Association for Computer Machinery(ACM). Her areas of interest are Digital Electronics, Data Structures, Computer Networks.

 

 

 

 

 

 

 

MANET

OLSR Protocol

2ACK scheme

Enhanced-2ACK

This paper presents ENHANCED-2ACK perform better in the presence of misbehaving nodes. Also it is proved that ENHANCED2ACK has lesser routing overhead and more advantageous than previous similar acknowledgement based schemes as it requires lesser number of acknowledgement packet transmission. It shows the comparison of ENHANCED-2ACK, with previously proposed acknowledgement based schemes, based on criteria of detection of malicious link or node and number of acknowledgement packets transmitted, with the increase in number of nodes on active route.

 

 

 

 

 

 

 

 

 

[1] Kapang Lego, Kapang Lego, DipankarSutradhar “Comparative Study of Ad-hoc Routing Protocol AODV,DSR and DSDV in Mobile Ad-hoc NETwork” Indian Journal of Computer Science and Engineering,2012. [2] Vikram Desai, ShriramNatrajan, Tilman Wolf “Packet Forwarding Misbhavior Detection in Next Generation Network”IEEE 2012 [3] ShimaMohseni, Rosilah Hassan, Ahmed Patel, and RozilawatiRazali “Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs”IEEE 2010 [4] Sergio Marti, T.G.Giuli,Kevin Lai, Mary Baker “Mitigating Routing Misbhavior in Mobile Ad-hoc Network”ACM 2000 [5] ButtyanL.AndHubaux J.-P., “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” 2012. [6] Buchegger S. And Le Boudec J.-Y., “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc, June 2012. [7] Balakrishnan K., Deng J., and Varshney P. K., “TWOACK: Preventing Selfishnessin Mobile Ad Hoc Networks,” Proc. IEEE 2005. [8] C. Mbarushimana, and A. Shahrabi, “Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks,” in Proc. of the 21st International Conference on Advanced Information Networking May 2007 [9] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing.May 2007. [10] Sheng Zhong , Jiang Chen , Yang Richard Yang , “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks” IEEE 2003 [11] S. A. Nagtilak, Prof. U.A. Mande“ The Detection Of Routing Misbehavior In Mobile Ad Hoc Networks Using The 2ackScheme With Olsr Protocol” International Journal Of Computer EngineeringAnd Technology,2010 [12] Unikolsrd homepage http://www.olsr.org [13] Sundararajan T.V.P., Dr.Shanmugam A.” Performance Analysis of Selfish Node Aware Routing Protocol for Mobile Ad Hoc Networks”, ICGST 2009 [14] G.MurugaBoopathi, N.Insozhan, S.Vinod “Selfish Nodes Detection Using Random 2ack In MANET” IJESE 2013 [15] U. Herberg and T. Clausen. “Security Issues in the Optimized Link State Routing Protocolversion 2 (OLSRv2)”. International Journal of Network Security & Its Applications 2010 [16] D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler. “Securing OLSR using node locations”. In Proceedings of 2005 European Wireless,2005. [17] T. Clausen, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, and L. Viennot,“Optimized Link State Routing Protocol,” Internet Engineering Task Force(IETF) draft, March, 2002.