The network topology of MANETs changes
rapidly and unpredictably and due to the changing topology
packet loss is a common phenomenon. Routing protocols used
in MANETs are based on the assumption that, all participating
nodes will be fully cooperative. But, due to the open structure
node misbehavior may exist and packet loss occurs. Among
them one type of misbehavior is that some nodes will take part
in route establishment processes but they do not respond to
forward data packets and simply dismiss the packets. The
2ACK scheme has a higher routing overhead which is caused
by the transmission of 2ACK packets. So by reducing the
acknowledgment ratio, Rack, the number of 2ACK
transmissions can be significantly lowered. The ENHANCED
2ACK scheme is immune to the limited overhearing range
issue caused due to low transmission power in the
communication link. It solves the problem of ambiguous
collisions, receiver collisions, and limited transmission power.
Ms. Farha Nausheen : graduated in Information Technology in
2007 from Muffakham Jah College of Engineering and
Technology and did her M.Tech in Computer Science in 2012
from the same college. She is currently Asst. Professor in the
Dept of IT, Muffakham Jah College of Engg. & Technology
since 2008. She is a member of Association for Computer
Machinery (ACM). Her areas of interest are Digital Electronics,
Data Structures, and Computer Networks.
Ms. Sayyada Hajera Begum : graduated in Information
Technology from Muffakham Jah College of Engineering and
Technology and did her M.Tech from Jawaharlal Nehru
Technological University, Hyderabad. She is currently Asst.
Professor in the Dept of IT, Muffakham Jah College of Engg. &
Technology since 2007. She is a member of Association for
Computer Machinery(ACM). Her areas of interest are Digital
Electronics, Data Structures, Computer Networks.
MANET
OLSR Protocol
2ACK scheme
Enhanced-2ACK
This paper presents ENHANCED-2ACK perform better
in the presence of misbehaving nodes. Also it is proved
that ENHANCED2ACK has lesser routing overhead and
more advantageous than previous similar acknowledgement based schemes as it requires lesser
number of acknowledgement packet transmission. It
shows the comparison of ENHANCED-2ACK, with
previously proposed acknowledgement based schemes,
based on criteria of detection of malicious link or node
and number of acknowledgement packets transmitted,
with the increase in number of nodes on active route.
[1] Kapang Lego, Kapang Lego, DipankarSutradhar
“Comparative Study of Ad-hoc Routing
Protocol AODV,DSR and DSDV in Mobile Ad-hoc
NETwork” Indian Journal of Computer Science and
Engineering,2012.
[2] Vikram Desai, ShriramNatrajan, Tilman Wolf
“Packet Forwarding Misbhavior Detection in Next
Generation Network”IEEE 2012
[3] ShimaMohseni, Rosilah Hassan, Ahmed Patel, and
RozilawatiRazali “Comparative Review Study of
Reactive and Proactive Routing Protocols in
MANETs”IEEE 2010
[4] Sergio Marti, T.G.Giuli,Kevin Lai, Mary Baker
“Mitigating Routing Misbhavior in Mobile Ad-hoc
Network”ACM 2000
[5] ButtyanL.AndHubaux J.-P., “Stimulating
Cooperation in Self-Organizing Mobile Ad Hoc
Networks,” 2012.
[6] Buchegger S. And Le Boudec J.-Y., “Performance
Analysis of the CONFIDANT Protocol: Cooperation
of Nodes, Fairness in Dynamic Ad-Hoc Networks,”
Proc. MobiHoc, June 2012.
[7] Balakrishnan K., Deng J., and Varshney P. K.,
“TWOACK: Preventing Selfishnessin Mobile Ad
Hoc Networks,” Proc. IEEE 2005.
[8] C. Mbarushimana, and A. Shahrabi, “Comparative
Study of Reactive and Proactive Routing Protocols
Performance in Mobile Ad Hoc Networks,” in Proc.
of the 21st International Conference on Advanced
Information Networking May 2007
[9] K. Liu, J. Deng, P. K. Varshney, and K.
Balakrishnan, "An Acknowledgment-based
Approach for the Detection of Routing Misbehavior
in MANETs," IEEE Transactions on Mobile
Computing.May 2007.
[10] Sheng Zhong , Jiang Chen , Yang Richard Yang ,
“Sprite: A Simple, Cheat-Proof, Credit-Based
System for Mobile Ad-Hoc Networks” IEEE 2003
[11] S. A. Nagtilak, Prof. U.A. Mande“ The Detection Of
Routing Misbehavior In Mobile Ad Hoc Networks
Using The 2ackScheme With Olsr Protocol”
International Journal Of Computer EngineeringAnd
Technology,2010
[12] Unikolsrd homepage http://www.olsr.org
[13] Sundararajan T.V.P., Dr.Shanmugam A.”
Performance Analysis of Selfish Node
Aware Routing Protocol for Mobile Ad Hoc
Networks”, ICGST 2009
[14] G.MurugaBoopathi, N.Insozhan, S.Vinod “Selfish
Nodes Detection Using Random 2ack In MANET”
IJESE 2013
[15] U. Herberg and T. Clausen. “Security Issues in the
Optimized Link State Routing Protocolversion 2
(OLSRv2)”. International Journal of Network
Security & Its Applications 2010 [16] D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler.
“Securing OLSR using node locations”. In
Proceedings of 2005 European Wireless,2005.
[17] T. Clausen, P. Jacquet, A. Laouiti, P. Minet, P.
Muhlethaler, A. Qayyum, and L.
Viennot,“Optimized Link State Routing Protocol,”
Internet Engineering Task Force(IETF) draft, March,
2002.