You are on page 1of 32

Detection of Routing Misbehavior in

MANETs
Prepared by:
Batch 03
Anusha B
C.M.Sateesh Kumar M
N.V.S.D.Jagadish Kumar M

Coordinated By:

Md Mir Khasim
Guided BY:

K Shirin Bhanu
Contents
Abstract
Introduction
Objectives
Routing Misbehavior
Existing System
Proposed System
How to work
Design
Features
Algorithm
Conclusion


Abstract
In general, routing protocols for MANETs are designed based on the
assumption that all participating nodes are fully cooperative.

However, due to the open structure and scarcely available battery-
based energy, node misbehaviors may exist.

One such routing misbehavior is that some selfish nodes will
participate in the route discovery and maintenance processes but
refuse to forward data packets.

We propose the2ACK scheme that serves as an add-on technique for
routing schemes to detect routing misbehavior and to mitigate their
adverse effect.

Introduction
Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts)
which communicate with each other via wireless links either directly or
relying on other nodes as routers.

The operation of MANETs does not depend on preexisting infrastructure or
base stations.

All network activities, such as discovering the topology and delivering data
packets, have to be executed by the nodes themselves, either individually
or collectively.

Depending on its application, the structure of a MANET may vary from a
small static network that is highly power-constrained to a large-scale, mobile,
highly dynamic network.


Objectives
The main aim of the system is detection of routing misbehavior in a
complex large scale heterogeneous mobile dynamic network in transmitting
data packets from source to destination

It also aims to detect misbehavior of routing more efficiently, accurately and
fastly.

It implements 2ACK scheme in order to detect the misbehavior, in which two
hop acknowledgement packets are transmitted in the opposite direction of the
routing path.

It also reduces the routing overhead in the process of acknowledgement by
acknowledging only fraction of data packet.



Routing Misbehavior
An individual mobile node may attempt to benefit from other nodes,
but refuse to share its own resources.

A selfish node may refuse to forward data packets for other nodes in
order to conserve its own energy

This misbehavior degrades the performance of the network.

Existing System
Our system is implemented as an add on technique to the DSR
protocol.

In this a selfish node does not perform the packet forwarding
function.

DSR involves two phases route discovery and route maintenance .

If it involves any misbehavior nodes then it tries to include another
route or starts new discovery for route which in turn includes
misbehavior nodes that leads to performance degradation.

Then in order to eliminate such degradation of performance we
introduce a new model with 2ACK scheme.
Proposed System

Our proposed system is mainly based on 2ACK scheme to detect
misbehavior.

In this scheme the acknowledgement is sent back to sender node.
How to work ?
In the above scenario we observe the Cmis, Cpkt and Rmis values and
calculate the Cmis/Cpkts ratio and compare with the Rmis value.

If the ratio is greater than Rmis then that link is declared as misbehaior
link and sends out report.

Later when a node starts its own data traffic it will avoid using such
misbehaving links.
Design
Use Case Model
TCP connection
UDP connection
Route discovery
Route maintenance
Establish n/w connection
Sharing resources
Compute routing tables
Send pkt
Receive pkt
send and receive ack
Destination node
Authenticating pkts
Partial data forwarding
Source node
Detect misbehavior
Intermediate node
Buffering
Sequence Diagram for Connection Establishment
s:Source n:Network i:Intermediate
Node
d:Destination
request to establish
connection to intermediate node
connection to destination node
change connection
disconnect
disconnect
Sequence diagram for data transmission
s:Source n:Network i:Intremediate
Node
d:destination a:Acknowledge
ment
1.request for network
2.connecting to intermediate
3.connecting to
4.send data packet
5.forward packet
6.receive packet
7.req to generate
ack
8.ack prepared
9.send ack
10.if no ack report to
source



Sequence diagram for routing packets:


s;Source r:Rroute i:Intermediate
Node
d:Destination n:Network
1.request for connection establishment
2.route discovery
3.connect to intermediate
4.connect to destination
5.change route
6.update routing
7.change the connection
Features of 2ACK
The 2ACK scheme avoids the following:
Ambiguous Collisions
Receiver Collisions
Limited Transmission Power
Limited Overhearing Range
Authenticating 2ACK packets
One way to stop a node from forging the 2ACK packets is to use the digital
signature algorithm.

A digital signature is a small number of extra bits of information attached
by sender node.

One way hash chain was used to guard against security attacks.
2ACK Packet Sender Side

1: publish hn
2: Cpkts <- 0, Cack <- 0, I <- n
3: while true do
4: if (data packet received) then
5: Cpkts ++
6: if (Cack/Cpkts < Rack) then
7: prepare MAC with hi-1
8: prepare 2ACK with ID, MAC, hi 9: send 2ACK
10: Cack ++, i - -
11: end
12: end
13: end

Algorithm

Receiver Side
Parallel process 1 (receiving hn)

1: While true do
2: if receive hn from the 2ACK packet sender then
3: record hn, i <- n
4: end
5: end
Parallel process 2 (receiving 2ACK packets)

6: while true do
7: randomly select Tstart > current time
8: while current time < Tstart do
9: end
10: LIST <- , Cpkts <-0, Cmis <- 0
11: while current time < Tstart + Tobs do
12: if (data packet forwarded) then
13: LIST <- LIST data ID
14: Cpkts ++
15: setup timer () for data ID
16: end
17: if (2ACK packet received) then
18: search data ID carried by 2ACK from LIST
19: if (found) then
20: check validity of hi
21: LIST <- LIST - data ID
22: clear timer for ID
23: end
24: end
25: if (timeout event happens) then
26: LIST <- LIST - data ID
27: Cmis ++
28: end
29: end
30: if (Cmis/Cpkts > Rmis) then
31: send link misbehavior report
32: end
33: end


Home Page
Output Screens
Conclusion
In this we have proposed and evaluated a technique termed 2ACK to
detect and mitigate the effect of routing misbehavior.

The 2ACK technique is based on a simple 2 hop acknowledgement packet
that is sent back by the receiver of the next hop link.

2ACK scheme maintains up to 91 percent packet delivery ratio even when
there are 40 percent misbehaving nodes in the MANETs.

Thank You
QUERIES ?

You might also like