Top Banner

of 32


Oct 23, 2016





  • Detection of Routing Misbehavior in MANETsPrepared by:Batch 03Anusha BC.M.Sateesh Kumar MN.V.S.D.Jagadish Kumar M

    Coordinated By:

    Md Mir KhasimGuided BY:

    K Shirin Bhanu

  • Contents Abstract Introduction Objectives Routing Misbehavior Existing System Proposed System How to work Design Features AlgorithmConclusion

  • Abstract In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative.

    However, due to the open structure and scarcely available battery- based energy, node misbehaviors may exist.

    One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets.

    We propose the2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect.

  • Introduction Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers.

    The operation of MANETs does not depend on preexisting infrastructure or base stations.

    All network activities, such as discovering the topology and delivering data packets, have to be executed by the nodes themselves, either individually or collectively.

    Depending on its application, the structure of a MANET may vary from a small static network that is highly power-constrained to a large-scale, mobile, highly dynamic network.

  • Objectives The main aim of the system is detection of routing misbehavior in a complex large scale heterogeneous mobile dynamic network in transmitting data packets from source to destination

    It also aims to detect misbehavior of routing more efficiently, accurately and fastly.

    It implements 2ACK scheme in order to detect the misbehavior, in which two hop acknowledgement packets are transmitted in the opposite direction of the routing path.

    It also reduces the routing overhead in the process of acknowledgement by acknowledging only fraction of data packet.

  • Routing Misbehavior An individual mobile node may attempt to benefit from other nodes, but refuse to share its own resources.

    A selfish node may refuse to forward data packets for other nodes in order to conserve its own energy

    This misbehavior degrades the performance of the network.

  • Existing System Our system is implemented as an add on technique to the DSR protocol.

    In this a selfish node does not perform the packet forwarding function.

    DSR involves two phases route discovery and route maintenance .

    If it involves any misbehavior nodes then it tries to include another route or starts new discovery for route which in turn includes misbehavior nodes that leads to performance degradation.

    Then in order to eliminate such degradation of performance we introduce a new model with 2ACK scheme.

  • Proposed System

    Our proposed system is mainly based on 2ACK scheme to detect misbehavior.

    In this scheme the acknowledgement is sent back to sender node.

  • How to work ? In the above scenario we observe the Cmis, Cpkt and Rmis values and calculate the Cmis/Cpkts ratio and compare with the Rmis value.

    If the ratio is greater than Rmis then that link is declared as misbehaior link and sends out report.

    Later when a node starts its own data traffic it will avoid using such misbehaving links.

  • Design

  • Use Case Model

  • Sequence Diagram for Connection Establishment

  • Sequence diagram for data transmission

  • Sequence diagram for routing packets:

  • Features of 2ACK The 2ACK scheme avoids the following: Ambiguous Collisions Receiver Collisions Limited Transmission Power Limited Overhearing Range

  • Authenticating 2ACK packets One way to stop a node from forging the 2ACK packets is to use the digital signature algorithm.

    A digital signature is a small number of extra bits of information attached by sender node.

    One way hash chain was used to guard against security attacks.

  • 2ACK Packet Sender Side

    1: publish hn 2: Cpkts

  • Receiver SideParallel process 1 (receiving hn)

    1: While true do 2: if receive hn from the 2ACK packet sender then 3: record hn, i

  • Parallel process 2 (receiving 2ACK packets) 6: while true do 7: randomly select Tstart > current time 8: while current time < Tstart do9: end10: LIST
  • 18: search data ID carried by 2ACK from LIST19: if (found) then 20: check validity of hi21: LIST
  • Home PageOutput Screens

  • Conclusion In this we have proposed and evaluated a technique termed 2ACK to detect and mitigate the effect of routing misbehavior.

    The 2ACK technique is based on a simple 2 hop acknowledgement packet that is sent back by the receiver of the next hop link.

    2ACK scheme maintains up to 91 percent packet delivery ratio even when there are 40 percent misbehaving nodes in the MANETs.

  • Thank You