SlideShare a Scribd company logo
1 of 22
Download to read offline
International Journal of Computer and Technology (IJCET), ISSN 0976 – 6367(Print),
International Journal of Computer Engineering Engineering
and Technology (IJCET), ISSN 0976May - June Print) © IAEME
ISSN 0976 – 6375(Online) Volume 1, Number 1,
                                                – 6367( (2010),
ISSN 0976 – 6375(Online) Volume 1
                                                                      IJCET
Number 1, May - June (2010), pp. 213-234                          ©IAEME
© IAEME, http://www.iaeme.com/ijcet.html


     THE DETECTION OF ROUTING MISBEHAVIOR IN
      MOBILE AD HOC NETWORKS USING THE 2ACK
                    SCHEME WITH OLSR PROTOCOL
                                  Mrs. S. A. Nagtilak
                         Department of Computer Engineering
                    S.C.O.E, Pune, E-Mail: saranagtilak@yahoo.co.in

                                   Prof. U.A. Mande
                Asst. Professors, Departments of Computer Engineering
                 S.C.O.E, Pune, E-Mail: uamande.scoe@sinhgad.edu


ABSTRACT
        The operation of MANETs does not depend on preexisting infrastructure or base
stations. Network nodes in MANETs are free to move randomly. Therefore, the network
topology of a MANET may change rapidly and unpredictably. This paper presents the
existing methods to detect misbehavior in MANETs. Routing protocols used in such type
of networks generally based on the assumption that, all participating nodes will be fully
cooperative. But, due to the open structure node misbehavior may exist and packet loss
occurs. Among them one type of misbehavior is that some nodes will take part in routing
establishment processes but they do not respond to forward data packets and simply
dismiss the packets. The goal of this work is to simulate the 2ACK scheme in ad hoc
network. To reduce extra routing overhead, and packet loss, only a few of the received
data packets are acknowledged in the 2ACK scheme. It reduces the routing overhead. It
has been observed that by using the 2ACK scheme the packet delivery ratio is increased.
The result of the 2ACK-OLSR indicates that it reduces the packet loss and increase the
routing overhead.
KEYWORDS: 2ACK, SACK, S-TWOACK, beans, nuggets




                                          213
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


I.    INTRODUCTION
         MANET mobile ad hoc network as the name suggests consists of a bunch of
entities called as nodes or hosts which communicate with each other exchanging
information with the help of intermediate devices called as routers. The links between
these so called nodes is generally invisible or called as wireless links. The structure of
such networks is not predefined or it does not depend on any base stations lonely but a lot
of other entities are also involved in the entire communication process. The topology of
such networks keeps on changing mainly due to a factor called as mobility.
        Network clients in MANETs may move randomly. Therefore, the network
topology of a MANET can be change unpredictably and speedily. All network activities,
for instance forwarding data packets, and detecting the topologies which concern with
nodes themselves for execution either collectively or individually. Due to this changing
topology packet loss is a common phenomenon. Any wireless network consists of a lot of
nodes that interact with each other exchanging information continuously. As these nodes
have the flexibility of moving from one place to other, there may be cases wherein a
particular node which is a receiver for a particular packet, moves away from the range of
sender. However the sender is not aware of this scenario and it might still keep on
sending packets thus leading to packet and data loss.
        The other case is a bit more interesting, whenever communication takes place
between any two nodes there are a lot of nodes involved in this communication process
acting as mediators. All these nodes agree to forward packets during the actual
communication process but one of them actually turns selfish during the data transfer,
this selfish node keeps on dropping packets as when received instead of forwarding it to
the next hop in the communication process. These selfish behavior results in packet loss
and also the source is unaware of such misbehaving node in the path towards the
destination. And there is no such mechanism to detect this misbehaving node.
        The structure of a MANET totally depends on application and it can vary from
network to network. For e.g. from a small static network which is highly power
constrained to a large hugely dynamic network. Lots of techniques have been discovered
to avoid the misbehavior or selfishness among nodes.



                                                214
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


        There has been a lot of improvements in the field of computer and wireless
technologies therefore there has been a lot of development expected in mobile wireless
computing typical applications of which can be used in military scenes, rescue operations
or where it is almost difficult to rely on wired network. MANET's are self organizable
and configurable hence also known as multi hop wireless ad hoc networks, where the
topology of the network keeps on changing continuously.
A. PACKET LOSS DUE TO ROUTING MISBEHAVIORS
        During data transfer in ad hoc networks, all the nodes in the network usually take
part in the communication process in order to increase or maximize the throughput.
Therefore the more the number of nodes greater is the bandwidth and smaller is the
network partition with smaller paths. However it might also happen that a node has
agreed to fully cooperate in the communication process but later refuses to do so resulting
in loss of packets because of its selfishness [14].
        A selfish node which acts as selfish by dropping packets does so because it is
unwilling to spend its battery life and CPU cycles and save its bandwidth. Such a
misbehaving node launches a denial of service attack by simply dropping packets.
        In some cases it might happen that the node which is dropping packets might have
fault in the software running at its end. So the need is to focus on how this misbehaving
node in order to decrease the packet loss can be detected [2]. There are a lot of schemes
available in order to detect the routing in MANET’s which are as follows:




             Figure 1 Scenario for packet dropping and misrouting
i) The watchdog technique: In this scheme misbehaving nodes are detected by
overhearing the wireless medium. The path rater technique, which is based on the
watchdog’s output, allows nodes to avoid the use of the misbehaving nodes in any future


                                                215
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


route selections. However, the drawback with watchdog technique is that it depends
heavily on overhearing principal; therefore there is chance that it might fail to identify
misbehavior in routing or raise false alarms in cases where ambiguous collisions, receiver
collisions are present, it might also fail sometimes in cases for limited transmission
power.
ii) ACK and SACK schemes: They are used to measure the usefulness of the
current route and to take appropriate action. For example, congestion control is based on
the reception of the ACK and the SACK packets.[1]
iii) TWOACK Scheme: The 2ACK and the TWOACK schemes have the following
major differences: 1) the node which acts as receiver in the 2ACK scheme usually sends
2ACK packets for a small amount of data packet which it has received, whereas, in the
TWOACK scheme, TWOACK packets are acknowledged for every data packet received
at the receivers end. But, however it was observed that sending acknowledgement for a
fraction of data packets received, improves the performance of 2ACK scheme when it
comes to routing overhead.
iv) (S-TWOACK) scheme or Selective TWOACK: In this scheme every
TWOACK packet will acknowledge or reply the receipt for number of data packets,
whereas in the 2ACK scheme, a 2ACK packet only acknowledges one data packet.
Because of such a small change, the 2ACK scheme gains easy control on the trade-off
that appears between the network performance and the cost as compared to the S-
TWOACK scheme.
II. EXISTING METHODOLOGIES
         Routing protocols for MANETs are designed based on the assumption that all
participating nodes are fully cooperative. Misbehaving nodes can be a significant
problem. The presence of selfish or malicious nodes degrades the efficiency of packet
relaying. It increases the packet delivery latency and the packet loss rate. Selfish nodes
lead to network partitioning. Various techniques have been proposed to prevent
selfishness in MANETs. These schemes can be broadly classified into two categories:
credit-based schemes and reputation-based schemes.




                                                216
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


A. CREDIT-BASED SCHEMES
        The basic idea of credit-based schemes presented [6] is to provide incentives for
nodes to faithfully perform networking functions. In order to achieve this goal, virtual
(electronic) currency or similar payment system may be set up. Nodes get paid for
providing services to other nodes. When they request other nodes to help them for packet
forwarding, they use the same payment system to pay for such services. The concept of
nuggets (also called beans) is used for payments for packet forwarding. There are two
models which use nuggets are: the Packet Purse Model shown Figure 2 and the Packet
Trade Model shown in Figure 3. In the Packet Purse Model, nuggets are loaded into the
packet before it is sent. The sender puts a certain number of nuggets on the data packet to
be sent. Each intermediate node earns nuggets in return for forwarding the packet. If the
packet exhausts its nuggets before reaching its destination, then it is dropped. In the
Packet Trade Model, each intermediate node “buys” the packet from the previous node
for some nuggets and “sells” it to the next node for more nuggets. Thus, each
intermediate node earns some nuggets for providing the forwarding service and the
overall cost of sending the packet is borne by the destination.
        In another implementation, each node maintains a counter termed the neglect
counter. The counter is decreased when the node sends packets of its own, but increased
when it forwards packets for the other nodes. The counter should be positive before a
node is allowed to send its packet. Therefore, the nodes are encouraged to continue to
help other nodes. Tamper resistant hardware modules are used to keep nodes from
increasing the neglect counter illegally.




                                  Figure 2 Packet purse model.


                                                217
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME




                                  Figure 3 Packet trade model.
          Another credit-based scheme, termed Sprite, has nodes that keep receipts of the
received/forwarded messages. When the users have a fast connection to a Credit
Clearance Service (CCS), they report all of these receipts. The CCS then decides the
charge and credit for the reporting nodes. In the network architecture of Sprite, the CCS
is assumed to be reachable through the use of the Internet, limiting the utility of Sprite.
The main problem with credit-based schemes is that they usually require some kind of
tamper-resistant hardware and/or extra protection for the virtual currency or the payment
system.
B. REPUTATION-BASED SCHEMES
          The second category of techniques to combat node misbehavior in MANETs is
reputation-based presented by [2]. In such schemes, network nodes collectively detect
and declare the misbehavior of a suspicious node. Such a declaration is then propagated
throughout the network so that the misbehaving node will be cut off from the rest of the
network. The two modules under this category are watchdog and path rater shown in Fig
4. Nodes operate in a promiscuous mode wherein the watchdog module overhears the
medium to check whether the next-hop node faithfully forwards the packet. At the same
time, it maintains a buffer of recently sent packets. A data packet is cleared from the
buffer when the watchdog overhears the same packet being forwarded by the next-hop
node over the medium. If a data packet remains in the buffer for too long, the watchdog
module accuses the next hop neighbor of misbehaving. Thus, the watchdog enables
misbehavior detection at the forwarding level as well as the link level. Based on the



                                                218
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


watchdog’s accusations, the path rater module rates every path in its cache and
subsequently chooses the path that best avoids misbehaving nodes. Due to its reliance on
overhearing, however, the watchdog technique may fail to detect misbehavior or raise
false alarms in the presence of ambiguous collisions, receiver collisions, and limited
transmission power.
        The CONFIDANT protocol [7] is another example of reputation-based schemes.
The protocol is based on selective altruism and utilitarianism, thus making misbehavior
unattractive. CONFIDANT consists of four important components—the Monitor, the
Reputation System, the Path Manager, and the Trust Manager. They perform the vital
functions of neighborhood watching, node rating, path rating, and sending and receiving
alarm messages, respectively. Each node            continuously      monitors the behavior of its
first-hop neighbors. If a suspicious event is detected, details of the event are passed to
the Reputation System. Depending on how significant and how frequent the event is, the
Reputation
        System modifies the rating of the suspected node. Once the rating of a node
becomes intolerable, control is passed to the Path Manager, which accordingly controls
the route cache. Warning messages are propagated to other nodes in the form of an Alarm
message sent out by the Trust Manager. The Monitor component in the CONFIDANT
scheme shown in Figure.5 observes the next hop neighbor’s behavior using the
overhearing technique. This causes the scheme to suffer from the same problems as the
watchdog scheme.




                                  Figure 4 Watchdog & Path rater.




                                                219
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


C. END-TO-END ACKNOWLEDGMENT SCHEMES
        There are several schemes that use end-to-end acknowledgments (ACKs) to detect
routing misbehavior or malicious nodes in wireless networks.
        In the TCP protocol, end-to-end acknowledgment is employed. Such
acknowledgments are sent by the end receiver to notify the sender about the reception of
data packets up to some locations of the continuous data stream. The Selective
Acknowledgment (SACK) technique [3] is used to acknowledge out-of-order data blocks.




                           Figure 5 CONFIDANT Scheme.
        The 2ACK technique differs from the ACK and the SACK schemes in the TCP
protocol in the following manner: The 2ACK scheme tries to detect those misbehaving
nodes which have agreed to forward data packets for the source node but refuse to do so
when data packets arrive. TCP, on the other hand, uses ACK and ACK to measure the
usefulness of the current route and to take appropriate action.
        In order to identify malicious routers that draw traffic toward them but fail to
correctly forward the traffic, the secure trace route protocol is proposed. The normal trace
route protocol allows the sender to simply send packets with increasing Time-To- Live
(TTL) values and wait for a warning message from the router at which time the packet’s
TTL value expires. The secure trace route protocol authenticates the trace route packets
and disguises them as regular data packets.
        In secure trace route scheme, binary search is initiated on faulty routes.
Asymptotically, log (n) probes are needed to identify a faulty link on a faulty n-hop route.
This technique only works with static misbehaviors and needs to disguise the probing



                                                220
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


messages as regular routing control packets. Once a link is identified as faulty, the link
weight is increased so that future link selections will avoid this link.
        The Best-effort Fault-Tolerant Routing (BFTR) scheme [16] also employs end-to-
end ACKs. The BFTR scheme continuously monitors the quality (i.e., packet delivery
ratio) of the path in use. This is compared with the predefined expected behavior of good
routes. If the behavior of the route in use deviates from the behavior of good routes, it is
marked as “infeasible” and a new route is used. Since BFTR throws out the entire route
before detecting the misbehaving nodes, the newly chosen route may still include the
same misbehaving nodes. Even though the new route will be detected as infeasible by the
source after a period of observation time, data packet loss will occur in traffic flows when
using protocols such as UDP. Such a repeated detection process is inefficient. In contrast
with BFTR, it is try to identify such misbehaving links in this work. Therefore, more
accurate information on routing misbehavior can be obtained in the 2ACK scheme.
III. COMPARISON WITH THE EXISTING SCHEMES
        Compared with the above schemes, the 2ACK scheme doesn’t depend on end-to
end acknowledgment. Instead, the 2ACK scheme tries to detect misdemeaning links as
the links are being used. Such a proactive detection approach results in quicker detection
and identification of misdemeaning links. In such a combined scheme, the Multi-Hop
transmission and the monitoring processes are turned on only when routing carry outface
degrades. It will further reduce the routing overhead of the 2ACK scheme.
        A scheme to choose routes based on the reliability index of each outgoing
neighbor has each node maintaining a table of reliability indices of its neighbors. This
type of reliability index indicates the previous success or failure experience of packet
transmissions through neighboring nodes. For example, a successful point-to-point
transmission will give output in an increase of the reliability index of the neighbor
associated with the route. When selecting path for data transmissions, nodes prefer those
rooted at the neighbors with higher reliability indices. Since a sender searches all possible
path from its immediate neighbors, the overall reliability of the selecting path depends on
how the neighbors select the rest of the route.




                                                221
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


As compared to the watchdog, the 2ACK scheme has the following
advantages:
Ambiguous Collisions: Ambiguous or doubtful collisions may occur at node N1.
When a well behaved node N2 forwards the data packet toward N3, it is possible that N1
cannot overhear the transmission due to another concurrent transmission in N1's
neighborhood. The 2ACK technique solves this problem by requiring N3 to send a Multi-
Hop packet explicitly.
Receiver Collisions: Receiver or acceptor collisions take place in case of overhearing
techniques when N1 overhears the data packet being forwarded by N2, but N3 fails to get
the packet due to collisions in its neighborhood. The data packets will not be
retransmitted by a misbehaving N2 because retransmission requires extra energy. Again,
due to the explicit Multi-Hop packets our 2ACK scheme overcomes this problem.
Limited Transmission Power: A misbehaving N2 may engineer its transmission
power in such a way that N1 can overhear its transmission but not N3 such that, this
problem matches with the Receiver Collisions problem. It goes to a level of threat only
when the distance between N1 and N2 is less than the distance between N2 and N3. The
2ACK scheme does not suffer from limited transmission power problem.
Limited Overhearing Range: In order to transmit data to N3 a well-behaved N2
could apply low level of power transmission. Due to N1's limited overhearing range, it
will not overhear the transmission successfully and will thus infer that N2 is
misbehaving, causing a false alarm. Both this problem occur due to the potential
asymmetry between the communication links. The 2ACK scheme is not affected by
limited overhearing range problem.
        The 2ACK scheme of detecting routing misbehavior is different from the
TWOACK and SACK schemes present in the TCP protocol in the following manner:
        The 2ACK technique identifies misbehaving nodes which had agreed to forward
data packets originating from the source node but later refuse to do so during actual data
transfer. On the other side, the TCP protocol uses SACK and ACK to find the benefit of
the current route and to take the required action. 2ACK scheme does not depend on end-
to-end acknowledgment. Such a 2ACK scheme may not exist in some traffic flows for


                                                222
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


instance UDP protocol. Such a proactive approach of detection results in faster detection
of misbehaving links.
IV. THE 2ACK SCHEME
        The watchdog finding technique has a very small overhead. Unfortunately, the
watch dog technique going to various problems i.e. equivocal collisions, recipient
collisions, and low transmit energy. The primary issue is the event of successful packet
reception can only be accurately calculated at the receiver of the next-hop link, but the
watchdog technique only observer the transmission from the sender of the next-hop link.
         Not a good behavior client can either be sender or receiver of the next-hop link,
concentration is given on the problem of finding a not good behavior links rather of not
good behavior client. In the next-hop link, a not good behavior source or destination has
alike contrary effect on the data packet: It will not be sent on further. The outcome is that
this link will be marked. 2ACK scheme importantly simplifies the detection mechanism.
A. DETAILS OF THE 2ACK SCHEME
        The 2ACK scheme is a network-layer technique to find links and to extenuate
their effects. It can be implemented as an add-on to existing path protocols for MANETs,
such as OLSR and any other routing protocols. The 2ACK scheme finds a good behavior
through the use of a new type of acknowledgment bundle, termed 2ACK. A 2ACK
bundle is assigned a fixed path of two hops (three nodes) in the contrary direction of the
data traffic path.
         The Figure 6 shows the operation of the 2ACK scheme. Suppose that N1, N2,
and N3 are three successive clients (triplet) along a path. The path from a source client, S,
to a destination client, D, is established from routing table information though HELLO
and TC control messages exchange. When N1 sends a data bundle to N2 and N2 sent it to
N3, it is not clear to N1 whether N3 receives the data bundle correctly or not. Such an
ambiguity exists even when there is a good behavioral client present. The problem
becomes much more severe in open MANETs with potential not good behaving client.




                                                223
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME




                                    Figure6 The 2ACK Scheme

           The 2ACK scheme needed an external acknowledgment to be sent by N3 to
advice N1 of its successful receipt of a data bundle. When client N3 got the data bundle
successfully, it sends out a 2ACK above two hops to N1, with the ID of the matching
data bundle. The three client N1→ N2→ N3 is calculated from the path of the main data
traffic.
           Such three clients are utilized by N1 to the link N2→N3. For gadget of displays,
it is termed that N1 in the three client N1→ N2→N3 the 2ACK bundle destination or the
remarking client and N3 the 2ACK source. Such a 2ACK packet sending takes place for
every set of three clients along the path. Hence, only the first path from the sender will
not do as a multi hop bundle destination. The final path just before the receiver and the
receiver will not do as multi hop destinations.
           To find misbehavior, the multi hop bundle source controls a records of IDs of data
bundles that have been sent out but have not been acknowledged. For e.g., later N1 sends
a data bundle on a actual path, say, N1→ N2 → N3. In diagram it sums the data ID to
LIST this is, on its records matching to N2N3. A counterpunch of sent on data bundle,
Cpkts, is incremented all the same time.

The details execution procedure is as follows:

       DUID        DST     Cpkts    2ACK        2ART      R-CNT       Cmis    Rmis    DTime


                   Figure7 Data structure maintained by the observing node

DUID (Data pkt Unique ID): This is used to record the unique packet id of the sent Data
packet.
DST (Data pkt Sent Time) : This records the time at which Data packet is sent.


                                                224
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


Cpkts: This gives the total number of Data packets that are sent.
D2ACK: This records the Data packet ID for which the observing node has received the
2ACK packet i.e., 2ACK Packet is received for this Data packet.
2ART (2ACK Receive Time): This records the time at which the 2ACK packet is
received.
R-CNT: It counts the total number of 2ACK packets that are received by the observing
node.
Cmis: It counts the total number of Data packets for which the 2ACK packet is not
received.
Rmis: It is the ratio of the Cmis to the total number of Data packets sent, i.e., Cmis / Cpkts.
Diff-Time: It is the difference of the time intervals 2ART and DST.
        At N1, each ID will remain on the record for τ seconds, the respite for 2ACK
reception. If 2ACK bundles matching to this ID arrive in front the timer exits, the ID will
be took out from the records. Other than, the ID will be taken out at the last of its look out
time separation and a counter called Cmis will be incremented.
        If N3 receives a data bundle, then calculated whether it wants to send a 2ACK
bundle to N1. In order to cut down the extra path overhead reason by the 2ACK outline,
only a divide the data bundle will be acknowledged verses multi hop bundle. Such a
divide termed the acknowledgment proportion, Rack. By changing Rack, we can
dynamically tune up the overhead of Many-Hop bundle transmissions.
The Data structure maintained by Data packet receiving node i.e., by Node N3 is as
follows:
        DUID             D-Total           R-Status           R2ACK_Total                   Rack

   Figure 8 Data structure maintained by the data packet receiving node (Node N3), i.e. 2ACK packet sender side

DUID (Data pkt Unique ID) : This records received Data packet unique ID.
D-Total: It counts the total number of Data Packets that are received.
R-Status: This records the status of Data packets for which 2ACK packet is sent.
R-status = 1 means for this DUID the receiving node has sent 2ACK packet and
viceversa.




                                                      225
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


R2ACK_Total: This field is used to count the total number of 2ACK packets that are
sent.
Rack: This field gives the ratio of the total number of data packets acknowledged to the
total number of Data packets received, i.e., R2ACK_Total/D-total.
        Client N1 remarks the behavior of link N2→N3 for a session of time Tobs. At the
last of the session, N1 determines the proportion of losing 2ACK bundles as Cmis / Cpkts
and compare it with a threshold Rmis. If the proportion is greater than Rmis, link N2→N3
is announced misbehaving and that particular link is being removed from the routing
table. The Data structure format of 2ACK is in the Figure 4.5. Since only a divide of the
get data bundle are acknowledged, Rmis could simplify Rmis > 1 - Rack in order to neglect
false alerts reason by such a partially acknowledgment technique.
        Every client getting such a 2ACK packet remarks the link N2→N3 as
misbehaving and sums it to the black records list of such misbehaving links that it
controls. When a client begins its own data traffic after, it will avoid using such
misbehaving connects as a part of its path.
                 DataPkt Src ID            Data Pkt Dst ID           Data Pkt ID

                           Figure 9 Data structure of the 2ACK packet.

B. TIMEOUT FOR MANY-HOP RECEPTION, Τ
        The argument timeout, τ, is need to set up a timer for 2ACK reception. If the
timer dies before the expected 2ACK bundle is received, the absent 2ACK counter, Cmis,
will be added. Hence, corresponding value of τ is significant for the successful work of
the 2ACK scheme.
        It is shows that false alarms achieved if τ is too small. On the other base, if τ is too
big, the waiting client will have to adjust big records, wanting a big memory space.
Therefore, set a value which is large sufficient to the occurrence of temporary link fails
(for e.g. the unsuccessful sending due to client wireless or local traffic congestion).

  τ > 4 * (single-hop transmission delay).            (1)




                                                226
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


Where a single-hop transmission delay adds bundle sending delay, random back-down
delay at the Medium Access Control (MAC) layer, data processing delay, and potential
resending delay.
C. OBSERVATION PERIOD, TOBS, AND DYNAMIC BEHAVIOR
        The 2ACK technique different link misbehavior and temporary link fails by
detecting the reception of 2ACK bundles on a certain session of time, termed the
detection session, Tobs. Since the impermanent link fails don’t use end long, such
assumption is able to unlike impermanent link fails from link misbehavior. The value of
Tobs should be large enough so that several 2ACK packets are sent from the multiple
source to the destination client. This is particularly significant when the acknowledgment
proportion, Rack, is light. For e.g., when Rack= 0.1, one 2ACK bundle will be sent for all
10 data bundles that are received. Even so, the watching session should not be too very
short. A very long watching session means that the watching client takes big time to
watch the behavior of the another-hop link in front not good behavior is stated. Data
bundles may be felled over this lengthy session of time and the effective of the not good
behavior detection algorithm is cut down.
        The 2ACK source has to send 2ACK packets for the total data session (on
platform the acknowledgment proportion, Rack). Such continuous watching activity will
help in the detection of not good behaving client which have active behavior depend on
their power layers. When such client are good-behaved, the links closed with them will
be treated as normal links and utilized. Once such clients misbehave, the links closed
with them will be observed as not good behaving and other clients will stop using them.
D. ACKNOWLEDGMENT RATIO, RACK
        The adding path overhead stimulated by the sending of the 2ACK bundles can be
handled by the argument acknowledgment proportions, Rack, at the 2ACK bundle sender.
With the use of the argument Rack in the 2ACK technique, only a divide of the received
data bundles will be acknowledged. Hence, the parameter Rack supplies a technique to
turn on the overhead. The decrease of overhead comes with a cost: the reducing of the
range over which Rmis can get cost. When only one Rack of the data bundles gotten are




                                                227
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


acknowledged via the 2ACK packets, 1 - Rack of them are not acknowledged. So 1 - Rack
of all data bundles are not acknowledged, Rmis >= 1 -Rack. i.e.,

           Rmis > =1 – Rack                                (2)

        Hence, the different between Rmis and 1 – Rack as the buffer to control fells. i.e.
Rack lowers the voltage extra space to fells down.
E. PARTIAL DATA FORWARDING
        A misbehaving node may forward data packets partially by forwarding a fraction
of the packets and try to cheat the monitoring system. Such a behavior will be detected by
the 2ACK scheme. The triplet N1→ N2 → N3 is used as an example for explanation.
        Assume a misbehaving node N2 receives ND data packets from N1 successfully
and only forwards a fraction of the data packets, say, Rpart (0 <= Rpart <= 1), of ND toward
N3. Further assumption is that all data packets forwarded by N2 are successfully received
by N3. Thus, N3 receives Rpart _ND data packets and only Rack _ Rpart _ ND of them will be
acknowledged by 2ACK packets sent from N3. Therefore, in order to cheat the system, a
misbehaving node N2 has to make sure that 1 - Rack. Rpart < Rmis. As the gap between 1 -
Rack and Rmis shrinks, the feasible value of Rpart approaches 1. Therefore, the 2ACK
scheme effectively guards against partial forwarding.
        Rpart > 1 – Rmis/Rack                            (3)
        Thus, by increasing 1-Rmis/Rack, force N2 to forward more data packets. The
disadvantage of such an approach is the loss of protection from false alarms.
F. OLSR PROTOCOL
        OLSR is a table-driven, link-state routing protocol that periodically advertises the
links in the network. OLSR optimizes the link advertisement process by reducing the
amount of advertised links and the number of nodes advertising them. OLSR also
optimizes the message broadcasting mechanism by limiting message forwarding to Multi
Point Relays (MPRs) only. [22]
HELLO AND TC MESSAGES TRANSMISSION
  OLSR nodes become aware of one-hop and two-hops neighbors by continuously
exchanging HELLO messages with their one-hop neighbors. MPR nodes are selected by


                                                228
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


each node in the network (called MPR Selector) as the minimum set of one-hop
neighbors that allow reaching every two-hop neighbor via a node in the MPR set. MPR
nodes optimize broadcasting and support path calculation. MPRs are the only nodes
generating Topology Control (TC) messages and are also responsible for forwarding
them. TC messages advertise the links between MPRs and MPR Selectors. The shortest
path algorithm uses these links to construct paths for every MPR Selector. MPR selection
process is as follows.
MPR SELECTION
        MPRs form the core optimization in OLSR. The idea of MPRs is to minimize the
overhead of flooding messages in the network by reducing the number of redundant
retransmissions. Each node in the network selects a minimum set of nodes in its
symmetric 1-hop neighborhood which retransmit its messages. This set is selected such
that every symmetric 2-hop node can be reached via a node in this set. MPR set of
selected neighbor nodes is called the MPR set of that node. The neighbors of the node
which are not in its MPR set, receive and process broadcast messages but do not forward
them. The smaller a MPR set, the lesser the control traffic overhead of the routing
protocol.
V. PERFORMANCE EVALUATION
        In the simulations, we used a version of Network Simulator (ns-2.34) [19] that
includes wireless extensions developed by the CMU Monarch project group. We installed
and modified the OLSR protocol in ns-2 to simulate misbehaving nodes. Unless specified
otherwise, the 2ACK scheme used Rack=0.2. The IEEE 802.11 MAC was used 15
mobile nodes were randomly distributed in a 1500 m by 1500 m flat area. The source and
the destination nodes were randomly chosen among all nodes in the network. The total
simulation time was 100 seconds UDP traffics have been simulated to evaluate the
performance of 2ACK.          Constant Bit Rate (CBR) traffic was used.               We used the
following metrics to measure the performance of the 2ACK scheme with respect to UDP
traffic:. Packet Delivery Ratio, PDR: the ratio of the number of packets received at the
destination and the number of packets sent by the source. Routing Overhead, RO : the
ratio of the amount of routing related transmissions (HELLO, TC, 2ACK and CBR) to



                                                229
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


the amount of data transmissions. The amounts are in bytes. Both forwarded and
transmitted packets are counted.
A. PACKET DELIVERY RATIO
PDR: It is the ratio of the number of packets received at the destination and the number
of packets sent by the source.
In the Figure10 the Rack is 0.2
         Table 1 The Relative Throughput Supported by 2ACK-OLSR and OLSR
                          Pm         0.1       0.2       0.3       0.4
                          OLSR       0.895     0.775     0.655     0.536
                          2ACK-      0.950     0.950     0.950     0.950
                          OLSR

        In Table1, the relative throughput, normalized number of packets received is
presented, when the 2ACK-OLSR scheme and the OLSR scheme are used. Based on
Table1, the relative throughput reduces when pm increases due to higher chances of using
routes with misbehaving links and longer time being spent to switch to good routes.
From the table, it can be observe that the 2ACK-OLSR scheme outperforms the OLSR
scheme in terms of relative throughput, especially in the networks with larger pm. It
represents packet delivery ratio (PDR), the total number of data packets that are received.




   Figure 10 Packet Delivery Ratio of OLSR and 2ACK-OLSR at different misbehavior ratio.




                                                230
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


B. ROUTING OVERHEAD
In the Figure11 the Rack is 0.2
               Table 2 The Routing overhead by 2ACK-OLSR and OLSR
                               0.1         0.2           0.3     0.4

                  OLSR         0.280       0.294         0.307   0.318
                  2ACK-        0.700       0.700         0.700   0.700
                  OLSR

        In the Table 2 the routing overhead is increased as a misbehavior ratio increased
in the case of OLSR. The routing overhead is calculated by using the formula as given
HELLO + TC/CBR for different Pm. The routing is calculated for the 2ACK-OLSR by
using the formula HELLO+TC+2ACK/CBR. The higher routing overhead in the 2ACK-
OLSR scheme is due to the transmission of extra acknowledgment packets.
VI.     CONCLUSIONS
        The 2ACK scheme which helps detect misbehavior by a two hop
acknowledgement. The 2ACK scheme is a network-layer technique to detect
misbehaving links and to mitigate their effects. The 2ACK scheme detects misbehavior
through the use of a new type of acknowledgment packet, termed 2ACK.




 Figure 11 Routing overhead of OLSR and 2ACK-OLSR at different misbehavior ratio.
       A 2ACK packet is assigned a fixed route of two hops (three nodes N1, N2, N3),
in the opposite direction of the data traffic route. This technique identifies misbehaving
nodes which had agreed to forward data packets originating from the source node but
later refuse to do so during actual data transfer and it helps to reduce the routing
overhead. The 2ACK technique is based on a simple 2-hop acknowledgment packet that



                                                   231
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


is sent back by the receiver of the next-hop link. The 2ACK scheme can be used as an
add-on technique to routing protocols such as OLSR in MANETs. One advantage of the
2ACK scheme is its flexibility to control overhead with the use of the Rack parameter.
VII. FUTURE WORK
        In this work, focus is given only on link misbehavior. The more troublesome task
is to determine the characteristics of a single node. The main reason behind this is the
communication is only between two nodes, and is not any node’s sole act. So, any nodes
associated with the misbehaving links should be punished carefully. In case of a link
misbehaving, then any one of the two co-related nodes may be misbehaving in the
association. In order to find the characteristics and punish a node, the behavior of links
around that node should be analyzed. A second case may arise wherein Node N1 floods
Node N2 with packets thus causing N2 to drop packets. Hence it is imperative that before
declaring a node to be selfish on the basis of the number of packets dropped, compute the
ratio of number packets received against the number of packets dropped should be
computed.
VIII.      REFERENCES
[1] Aad I., Hubaux J.-P., and Knightly E-W., “Denial of Service Resilience in Ad Hoc
    Networks,” Proc. MobiCom, pp. 202-215, 2004.
[2] Baker M, Giuli T., Lai K. and Marti S., “Mitigating Routing Misbehavior in Mobile
    Ad Hoc Networks,” Proc. MobiCom, pp. 255-265, Aug. 2000.
[3] Balakrishnan K., Deng J., and Varshney P. K., “TWOACK: Preventing Selfishness
    in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf.
    (WCNC ’05), pp.2137-2142 Mar. 2005.
[4] Buttyan L. and Hubaux J. -P., “Security and Cooperation in Wireless Networks,”
    http://secowinet.epfl.ch/, 2006.
[5] Buttyan L.and Hubaux J.-P., “Stimulating Cooperation in Self-Organizing Mobile
    Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5,
    pp. 579-592, 2003.
[6] Buttyan L. and Hubaux J.-P., “Enforcing Service Availability in Mobile Ad-Hoc
    WANs,” Proc. MobiHoc, pp, 255-265, Aug. 2000.



                                                232
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


[7] Buchegger S. and Le Boudec J.-Y., “Performance Analysis of the CONFIDANT
      Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc.
      MobiHoc, pp. 226-236, June 2002.
[8] Buttyan L., Hubaux J.-P.,and Jakobsson M., “A Micropayment Scheme Encouraging
      Collaboration in Multi-Hop Cellular Networks,” Proc. Financial Cryptography Conf.,
      pp. 609-612, Jan. 2003.
[9]    Chiasserini C.F., Nuggehalli P., Srinivasan V., and Rao R.R., “Cooperation in
       Wireless Ad Hoc Networks,” Proc. INFOCOM, vol.2, pp. 808-817 Mar.-Apr. 2003.
[10] Dipak Ghosal, Rose P. Tsang, and Stephen Mueller. “Multipath Routing in Mobile
       Ad Hoc Networks: Issues and Challenges in Performance tools and applications to
       networked systems” revised tutorial lectures 2004, Volume 2965, Pages 209-234,
       Year of Publication :2004, ISBN 3-540-21945-5
[11] Floyd S., Mathis M., Mahdavi J., and Romanow A., “RFC 2018 TCP Selective
       Acknowledgement Options,” technical report, PSC, LBNL, Sun Microsystems, Oct.
       1996.
[12] Jing Deng, Kejun Liu, Pramod K. Varshney, Fellow and Kashyap Balakrishnan. An
       Acknowledgment-Based Approach for the Detection of Routing Misbehavior in
       MANETs IEEE Transactions on Mobile Computing, Volume 6 , Issue 5 (May
       2007) Pages 536-550, Year of Publication: 2007, ISSN: 1536-1233
[13] Miranda H. and Rodrigues L., “Preventing Selfishness in Open Mobile Ad Hoc
       Networks,” Proc. Seventh CaberNet Radicals Workshop, Oct. 2002.
[14] Nahrstedt K. and Xue Y., “Providing Fault-Tolerant Ad-Hoc Routing Service in
       Adversarial     Environments,” Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367-
       388, 2004.
[15] Sundararajan T.V.P., Dr.Shanmugam A.” Performance Analysis of Selfish Node
       Aware Routing Protocol for Mobile Ad Hoc Networks”, ICGST-CNIR Journal,
       Volume 9, Issue 1, July 2009
[16] Haas Z.J. and L. Zhou and. Securing Ad Hoc Networks in IEEE Network
       Magazine, 1999.Volume 13, Nov./Dec. 1999, Issue 6. Pages.551-567, Year of
       Publication: 2003 ISBN: 0-8493-1332-5



                                                233
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME


[17] Nahrstedt K. and Xue Y., “Providing Fault-Tolerant Ad-Hoc Routing Service in
       Adversarial     Environments,” Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367-
       388, 2004.
[18] Sundararajan T.V.P., Dr.Shanmugam A.” Performance Analysis of Selfish Node
       Aware Routing Protocol for Mobile Ad Hoc Networks”, ICGST-CNIR Journal,
       Volume 9, Issue 1, July 2009
[19] The Network Simulator – ns-2 - http://www.isi.edu/nsnam/ns/
[20]    Tutorial for Ns-2 - http://www.isi.edu/nsnam/ns/tutorial/
[21]    NS by Example - http://nile.wpi.edu/NS/
[22]    Unik olsrd homepage http://www.olsr.org




                                                234

More Related Content

What's hot

Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksIAEME Publication
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 

What's hot (14)

Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
ant2
ant2ant2
ant2
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Ant
AntAnt
Ant
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Br33421423
Br33421423Br33421423
Br33421423
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 

Viewers also liked

Recursos EnergéTicos
Recursos EnergéTicosRecursos EnergéTicos
Recursos EnergéTicosflorentimi
 
Time domain sound spectrum measurements in ducted axial fan
Time domain sound spectrum measurements in ducted axial fanTime domain sound spectrum measurements in ducted axial fan
Time domain sound spectrum measurements in ducted axial fanIAEME Publication
 
Nuevo Amanecer
Nuevo AmanecerNuevo Amanecer
Nuevo AmanecerItimad
 
The holistic approach of ayurveda based wellness tourism in kerala
The holistic approach of ayurveda based wellness tourism in keralaThe holistic approach of ayurveda based wellness tourism in kerala
The holistic approach of ayurveda based wellness tourism in keralaIAEME Publication
 
Fast and effective heart attack prediction system using non linear cellular a...
Fast and effective heart attack prediction system using non linear cellular a...Fast and effective heart attack prediction system using non linear cellular a...
Fast and effective heart attack prediction system using non linear cellular a...IAEME Publication
 
Valentine district charrette presentation
Valentine district charrette presentationValentine district charrette presentation
Valentine district charrette presentationthedublinproject
 
A novel approach for satellite imagery storage by classifying the non duplica...
A novel approach for satellite imagery storage by classifying the non duplica...A novel approach for satellite imagery storage by classifying the non duplica...
A novel approach for satellite imagery storage by classifying the non duplica...IAEME Publication
 
Natural convection in a two sided lid-driven inclined porous enclosure with s...
Natural convection in a two sided lid-driven inclined porous enclosure with s...Natural convection in a two sided lid-driven inclined porous enclosure with s...
Natural convection in a two sided lid-driven inclined porous enclosure with s...IAEME Publication
 
Industria cultural
Industria culturalIndustria cultural
Industria culturalpacobr
 

Viewers also liked (9)

Recursos EnergéTicos
Recursos EnergéTicosRecursos EnergéTicos
Recursos EnergéTicos
 
Time domain sound spectrum measurements in ducted axial fan
Time domain sound spectrum measurements in ducted axial fanTime domain sound spectrum measurements in ducted axial fan
Time domain sound spectrum measurements in ducted axial fan
 
Nuevo Amanecer
Nuevo AmanecerNuevo Amanecer
Nuevo Amanecer
 
The holistic approach of ayurveda based wellness tourism in kerala
The holistic approach of ayurveda based wellness tourism in keralaThe holistic approach of ayurveda based wellness tourism in kerala
The holistic approach of ayurveda based wellness tourism in kerala
 
Fast and effective heart attack prediction system using non linear cellular a...
Fast and effective heart attack prediction system using non linear cellular a...Fast and effective heart attack prediction system using non linear cellular a...
Fast and effective heart attack prediction system using non linear cellular a...
 
Valentine district charrette presentation
Valentine district charrette presentationValentine district charrette presentation
Valentine district charrette presentation
 
A novel approach for satellite imagery storage by classifying the non duplica...
A novel approach for satellite imagery storage by classifying the non duplica...A novel approach for satellite imagery storage by classifying the non duplica...
A novel approach for satellite imagery storage by classifying the non duplica...
 
Natural convection in a two sided lid-driven inclined porous enclosure with s...
Natural convection in a two sided lid-driven inclined porous enclosure with s...Natural convection in a two sided lid-driven inclined porous enclosure with s...
Natural convection in a two sided lid-driven inclined porous enclosure with s...
 
Industria cultural
Industria culturalIndustria cultural
Industria cultural
 

Similar to The detection of routing misbehavior in mobile ad hoc networks using the 2 ack scheme with olsr protocol

Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...IEEEGLOBALSOFTTECHNOLOGIES
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsIEEEFINALYEARPROJECTS
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...ijassn
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2IAEME Publication
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...ijassn
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONIRJET Journal
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 

Similar to The detection of routing misbehavior in mobile ad hoc networks using the 2 ack scheme with olsr protocol (20)

Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
B0781013215
B0781013215B0781013215
B0781013215
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
eaodv
eaodveaodv
eaodv
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

The detection of routing misbehavior in mobile ad hoc networks using the 2 ack scheme with olsr protocol

  • 1. International Journal of Computer and Technology (IJCET), ISSN 0976 – 6367(Print), International Journal of Computer Engineering Engineering and Technology (IJCET), ISSN 0976May - June Print) © IAEME ISSN 0976 – 6375(Online) Volume 1, Number 1, – 6367( (2010), ISSN 0976 – 6375(Online) Volume 1 IJCET Number 1, May - June (2010), pp. 213-234 ©IAEME © IAEME, http://www.iaeme.com/ijcet.html THE DETECTION OF ROUTING MISBEHAVIOR IN MOBILE AD HOC NETWORKS USING THE 2ACK SCHEME WITH OLSR PROTOCOL Mrs. S. A. Nagtilak Department of Computer Engineering S.C.O.E, Pune, E-Mail: saranagtilak@yahoo.co.in Prof. U.A. Mande Asst. Professors, Departments of Computer Engineering S.C.O.E, Pune, E-Mail: uamande.scoe@sinhgad.edu ABSTRACT The operation of MANETs does not depend on preexisting infrastructure or base stations. Network nodes in MANETs are free to move randomly. Therefore, the network topology of a MANET may change rapidly and unpredictably. This paper presents the existing methods to detect misbehavior in MANETs. Routing protocols used in such type of networks generally based on the assumption that, all participating nodes will be fully cooperative. But, due to the open structure node misbehavior may exist and packet loss occurs. Among them one type of misbehavior is that some nodes will take part in routing establishment processes but they do not respond to forward data packets and simply dismiss the packets. The goal of this work is to simulate the 2ACK scheme in ad hoc network. To reduce extra routing overhead, and packet loss, only a few of the received data packets are acknowledged in the 2ACK scheme. It reduces the routing overhead. It has been observed that by using the 2ACK scheme the packet delivery ratio is increased. The result of the 2ACK-OLSR indicates that it reduces the packet loss and increase the routing overhead. KEYWORDS: 2ACK, SACK, S-TWOACK, beans, nuggets 213
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME I. INTRODUCTION MANET mobile ad hoc network as the name suggests consists of a bunch of entities called as nodes or hosts which communicate with each other exchanging information with the help of intermediate devices called as routers. The links between these so called nodes is generally invisible or called as wireless links. The structure of such networks is not predefined or it does not depend on any base stations lonely but a lot of other entities are also involved in the entire communication process. The topology of such networks keeps on changing mainly due to a factor called as mobility. Network clients in MANETs may move randomly. Therefore, the network topology of a MANET can be change unpredictably and speedily. All network activities, for instance forwarding data packets, and detecting the topologies which concern with nodes themselves for execution either collectively or individually. Due to this changing topology packet loss is a common phenomenon. Any wireless network consists of a lot of nodes that interact with each other exchanging information continuously. As these nodes have the flexibility of moving from one place to other, there may be cases wherein a particular node which is a receiver for a particular packet, moves away from the range of sender. However the sender is not aware of this scenario and it might still keep on sending packets thus leading to packet and data loss. The other case is a bit more interesting, whenever communication takes place between any two nodes there are a lot of nodes involved in this communication process acting as mediators. All these nodes agree to forward packets during the actual communication process but one of them actually turns selfish during the data transfer, this selfish node keeps on dropping packets as when received instead of forwarding it to the next hop in the communication process. These selfish behavior results in packet loss and also the source is unaware of such misbehaving node in the path towards the destination. And there is no such mechanism to detect this misbehaving node. The structure of a MANET totally depends on application and it can vary from network to network. For e.g. from a small static network which is highly power constrained to a large hugely dynamic network. Lots of techniques have been discovered to avoid the misbehavior or selfishness among nodes. 214
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME There has been a lot of improvements in the field of computer and wireless technologies therefore there has been a lot of development expected in mobile wireless computing typical applications of which can be used in military scenes, rescue operations or where it is almost difficult to rely on wired network. MANET's are self organizable and configurable hence also known as multi hop wireless ad hoc networks, where the topology of the network keeps on changing continuously. A. PACKET LOSS DUE TO ROUTING MISBEHAVIORS During data transfer in ad hoc networks, all the nodes in the network usually take part in the communication process in order to increase or maximize the throughput. Therefore the more the number of nodes greater is the bandwidth and smaller is the network partition with smaller paths. However it might also happen that a node has agreed to fully cooperate in the communication process but later refuses to do so resulting in loss of packets because of its selfishness [14]. A selfish node which acts as selfish by dropping packets does so because it is unwilling to spend its battery life and CPU cycles and save its bandwidth. Such a misbehaving node launches a denial of service attack by simply dropping packets. In some cases it might happen that the node which is dropping packets might have fault in the software running at its end. So the need is to focus on how this misbehaving node in order to decrease the packet loss can be detected [2]. There are a lot of schemes available in order to detect the routing in MANET’s which are as follows: Figure 1 Scenario for packet dropping and misrouting i) The watchdog technique: In this scheme misbehaving nodes are detected by overhearing the wireless medium. The path rater technique, which is based on the watchdog’s output, allows nodes to avoid the use of the misbehaving nodes in any future 215
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME route selections. However, the drawback with watchdog technique is that it depends heavily on overhearing principal; therefore there is chance that it might fail to identify misbehavior in routing or raise false alarms in cases where ambiguous collisions, receiver collisions are present, it might also fail sometimes in cases for limited transmission power. ii) ACK and SACK schemes: They are used to measure the usefulness of the current route and to take appropriate action. For example, congestion control is based on the reception of the ACK and the SACK packets.[1] iii) TWOACK Scheme: The 2ACK and the TWOACK schemes have the following major differences: 1) the node which acts as receiver in the 2ACK scheme usually sends 2ACK packets for a small amount of data packet which it has received, whereas, in the TWOACK scheme, TWOACK packets are acknowledged for every data packet received at the receivers end. But, however it was observed that sending acknowledgement for a fraction of data packets received, improves the performance of 2ACK scheme when it comes to routing overhead. iv) (S-TWOACK) scheme or Selective TWOACK: In this scheme every TWOACK packet will acknowledge or reply the receipt for number of data packets, whereas in the 2ACK scheme, a 2ACK packet only acknowledges one data packet. Because of such a small change, the 2ACK scheme gains easy control on the trade-off that appears between the network performance and the cost as compared to the S- TWOACK scheme. II. EXISTING METHODOLOGIES Routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. Misbehaving nodes can be a significant problem. The presence of selfish or malicious nodes degrades the efficiency of packet relaying. It increases the packet delivery latency and the packet loss rate. Selfish nodes lead to network partitioning. Various techniques have been proposed to prevent selfishness in MANETs. These schemes can be broadly classified into two categories: credit-based schemes and reputation-based schemes. 216
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME A. CREDIT-BASED SCHEMES The basic idea of credit-based schemes presented [6] is to provide incentives for nodes to faithfully perform networking functions. In order to achieve this goal, virtual (electronic) currency or similar payment system may be set up. Nodes get paid for providing services to other nodes. When they request other nodes to help them for packet forwarding, they use the same payment system to pay for such services. The concept of nuggets (also called beans) is used for payments for packet forwarding. There are two models which use nuggets are: the Packet Purse Model shown Figure 2 and the Packet Trade Model shown in Figure 3. In the Packet Purse Model, nuggets are loaded into the packet before it is sent. The sender puts a certain number of nuggets on the data packet to be sent. Each intermediate node earns nuggets in return for forwarding the packet. If the packet exhausts its nuggets before reaching its destination, then it is dropped. In the Packet Trade Model, each intermediate node “buys” the packet from the previous node for some nuggets and “sells” it to the next node for more nuggets. Thus, each intermediate node earns some nuggets for providing the forwarding service and the overall cost of sending the packet is borne by the destination. In another implementation, each node maintains a counter termed the neglect counter. The counter is decreased when the node sends packets of its own, but increased when it forwards packets for the other nodes. The counter should be positive before a node is allowed to send its packet. Therefore, the nodes are encouraged to continue to help other nodes. Tamper resistant hardware modules are used to keep nodes from increasing the neglect counter illegally. Figure 2 Packet purse model. 217
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME Figure 3 Packet trade model. Another credit-based scheme, termed Sprite, has nodes that keep receipts of the received/forwarded messages. When the users have a fast connection to a Credit Clearance Service (CCS), they report all of these receipts. The CCS then decides the charge and credit for the reporting nodes. In the network architecture of Sprite, the CCS is assumed to be reachable through the use of the Internet, limiting the utility of Sprite. The main problem with credit-based schemes is that they usually require some kind of tamper-resistant hardware and/or extra protection for the virtual currency or the payment system. B. REPUTATION-BASED SCHEMES The second category of techniques to combat node misbehavior in MANETs is reputation-based presented by [2]. In such schemes, network nodes collectively detect and declare the misbehavior of a suspicious node. Such a declaration is then propagated throughout the network so that the misbehaving node will be cut off from the rest of the network. The two modules under this category are watchdog and path rater shown in Fig 4. Nodes operate in a promiscuous mode wherein the watchdog module overhears the medium to check whether the next-hop node faithfully forwards the packet. At the same time, it maintains a buffer of recently sent packets. A data packet is cleared from the buffer when the watchdog overhears the same packet being forwarded by the next-hop node over the medium. If a data packet remains in the buffer for too long, the watchdog module accuses the next hop neighbor of misbehaving. Thus, the watchdog enables misbehavior detection at the forwarding level as well as the link level. Based on the 218
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME watchdog’s accusations, the path rater module rates every path in its cache and subsequently chooses the path that best avoids misbehaving nodes. Due to its reliance on overhearing, however, the watchdog technique may fail to detect misbehavior or raise false alarms in the presence of ambiguous collisions, receiver collisions, and limited transmission power. The CONFIDANT protocol [7] is another example of reputation-based schemes. The protocol is based on selective altruism and utilitarianism, thus making misbehavior unattractive. CONFIDANT consists of four important components—the Monitor, the Reputation System, the Path Manager, and the Trust Manager. They perform the vital functions of neighborhood watching, node rating, path rating, and sending and receiving alarm messages, respectively. Each node continuously monitors the behavior of its first-hop neighbors. If a suspicious event is detected, details of the event are passed to the Reputation System. Depending on how significant and how frequent the event is, the Reputation System modifies the rating of the suspected node. Once the rating of a node becomes intolerable, control is passed to the Path Manager, which accordingly controls the route cache. Warning messages are propagated to other nodes in the form of an Alarm message sent out by the Trust Manager. The Monitor component in the CONFIDANT scheme shown in Figure.5 observes the next hop neighbor’s behavior using the overhearing technique. This causes the scheme to suffer from the same problems as the watchdog scheme. Figure 4 Watchdog & Path rater. 219
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME C. END-TO-END ACKNOWLEDGMENT SCHEMES There are several schemes that use end-to-end acknowledgments (ACKs) to detect routing misbehavior or malicious nodes in wireless networks. In the TCP protocol, end-to-end acknowledgment is employed. Such acknowledgments are sent by the end receiver to notify the sender about the reception of data packets up to some locations of the continuous data stream. The Selective Acknowledgment (SACK) technique [3] is used to acknowledge out-of-order data blocks. Figure 5 CONFIDANT Scheme. The 2ACK technique differs from the ACK and the SACK schemes in the TCP protocol in the following manner: The 2ACK scheme tries to detect those misbehaving nodes which have agreed to forward data packets for the source node but refuse to do so when data packets arrive. TCP, on the other hand, uses ACK and ACK to measure the usefulness of the current route and to take appropriate action. In order to identify malicious routers that draw traffic toward them but fail to correctly forward the traffic, the secure trace route protocol is proposed. The normal trace route protocol allows the sender to simply send packets with increasing Time-To- Live (TTL) values and wait for a warning message from the router at which time the packet’s TTL value expires. The secure trace route protocol authenticates the trace route packets and disguises them as regular data packets. In secure trace route scheme, binary search is initiated on faulty routes. Asymptotically, log (n) probes are needed to identify a faulty link on a faulty n-hop route. This technique only works with static misbehaviors and needs to disguise the probing 220
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME messages as regular routing control packets. Once a link is identified as faulty, the link weight is increased so that future link selections will avoid this link. The Best-effort Fault-Tolerant Routing (BFTR) scheme [16] also employs end-to- end ACKs. The BFTR scheme continuously monitors the quality (i.e., packet delivery ratio) of the path in use. This is compared with the predefined expected behavior of good routes. If the behavior of the route in use deviates from the behavior of good routes, it is marked as “infeasible” and a new route is used. Since BFTR throws out the entire route before detecting the misbehaving nodes, the newly chosen route may still include the same misbehaving nodes. Even though the new route will be detected as infeasible by the source after a period of observation time, data packet loss will occur in traffic flows when using protocols such as UDP. Such a repeated detection process is inefficient. In contrast with BFTR, it is try to identify such misbehaving links in this work. Therefore, more accurate information on routing misbehavior can be obtained in the 2ACK scheme. III. COMPARISON WITH THE EXISTING SCHEMES Compared with the above schemes, the 2ACK scheme doesn’t depend on end-to end acknowledgment. Instead, the 2ACK scheme tries to detect misdemeaning links as the links are being used. Such a proactive detection approach results in quicker detection and identification of misdemeaning links. In such a combined scheme, the Multi-Hop transmission and the monitoring processes are turned on only when routing carry outface degrades. It will further reduce the routing overhead of the 2ACK scheme. A scheme to choose routes based on the reliability index of each outgoing neighbor has each node maintaining a table of reliability indices of its neighbors. This type of reliability index indicates the previous success or failure experience of packet transmissions through neighboring nodes. For example, a successful point-to-point transmission will give output in an increase of the reliability index of the neighbor associated with the route. When selecting path for data transmissions, nodes prefer those rooted at the neighbors with higher reliability indices. Since a sender searches all possible path from its immediate neighbors, the overall reliability of the selecting path depends on how the neighbors select the rest of the route. 221
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME As compared to the watchdog, the 2ACK scheme has the following advantages: Ambiguous Collisions: Ambiguous or doubtful collisions may occur at node N1. When a well behaved node N2 forwards the data packet toward N3, it is possible that N1 cannot overhear the transmission due to another concurrent transmission in N1's neighborhood. The 2ACK technique solves this problem by requiring N3 to send a Multi- Hop packet explicitly. Receiver Collisions: Receiver or acceptor collisions take place in case of overhearing techniques when N1 overhears the data packet being forwarded by N2, but N3 fails to get the packet due to collisions in its neighborhood. The data packets will not be retransmitted by a misbehaving N2 because retransmission requires extra energy. Again, due to the explicit Multi-Hop packets our 2ACK scheme overcomes this problem. Limited Transmission Power: A misbehaving N2 may engineer its transmission power in such a way that N1 can overhear its transmission but not N3 such that, this problem matches with the Receiver Collisions problem. It goes to a level of threat only when the distance between N1 and N2 is less than the distance between N2 and N3. The 2ACK scheme does not suffer from limited transmission power problem. Limited Overhearing Range: In order to transmit data to N3 a well-behaved N2 could apply low level of power transmission. Due to N1's limited overhearing range, it will not overhear the transmission successfully and will thus infer that N2 is misbehaving, causing a false alarm. Both this problem occur due to the potential asymmetry between the communication links. The 2ACK scheme is not affected by limited overhearing range problem. The 2ACK scheme of detecting routing misbehavior is different from the TWOACK and SACK schemes present in the TCP protocol in the following manner: The 2ACK technique identifies misbehaving nodes which had agreed to forward data packets originating from the source node but later refuse to do so during actual data transfer. On the other side, the TCP protocol uses SACK and ACK to find the benefit of the current route and to take the required action. 2ACK scheme does not depend on end- to-end acknowledgment. Such a 2ACK scheme may not exist in some traffic flows for 222
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME instance UDP protocol. Such a proactive approach of detection results in faster detection of misbehaving links. IV. THE 2ACK SCHEME The watchdog finding technique has a very small overhead. Unfortunately, the watch dog technique going to various problems i.e. equivocal collisions, recipient collisions, and low transmit energy. The primary issue is the event of successful packet reception can only be accurately calculated at the receiver of the next-hop link, but the watchdog technique only observer the transmission from the sender of the next-hop link. Not a good behavior client can either be sender or receiver of the next-hop link, concentration is given on the problem of finding a not good behavior links rather of not good behavior client. In the next-hop link, a not good behavior source or destination has alike contrary effect on the data packet: It will not be sent on further. The outcome is that this link will be marked. 2ACK scheme importantly simplifies the detection mechanism. A. DETAILS OF THE 2ACK SCHEME The 2ACK scheme is a network-layer technique to find links and to extenuate their effects. It can be implemented as an add-on to existing path protocols for MANETs, such as OLSR and any other routing protocols. The 2ACK scheme finds a good behavior through the use of a new type of acknowledgment bundle, termed 2ACK. A 2ACK bundle is assigned a fixed path of two hops (three nodes) in the contrary direction of the data traffic path. The Figure 6 shows the operation of the 2ACK scheme. Suppose that N1, N2, and N3 are three successive clients (triplet) along a path. The path from a source client, S, to a destination client, D, is established from routing table information though HELLO and TC control messages exchange. When N1 sends a data bundle to N2 and N2 sent it to N3, it is not clear to N1 whether N3 receives the data bundle correctly or not. Such an ambiguity exists even when there is a good behavioral client present. The problem becomes much more severe in open MANETs with potential not good behaving client. 223
  • 12. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME Figure6 The 2ACK Scheme The 2ACK scheme needed an external acknowledgment to be sent by N3 to advice N1 of its successful receipt of a data bundle. When client N3 got the data bundle successfully, it sends out a 2ACK above two hops to N1, with the ID of the matching data bundle. The three client N1→ N2→ N3 is calculated from the path of the main data traffic. Such three clients are utilized by N1 to the link N2→N3. For gadget of displays, it is termed that N1 in the three client N1→ N2→N3 the 2ACK bundle destination or the remarking client and N3 the 2ACK source. Such a 2ACK packet sending takes place for every set of three clients along the path. Hence, only the first path from the sender will not do as a multi hop bundle destination. The final path just before the receiver and the receiver will not do as multi hop destinations. To find misbehavior, the multi hop bundle source controls a records of IDs of data bundles that have been sent out but have not been acknowledged. For e.g., later N1 sends a data bundle on a actual path, say, N1→ N2 → N3. In diagram it sums the data ID to LIST this is, on its records matching to N2N3. A counterpunch of sent on data bundle, Cpkts, is incremented all the same time. The details execution procedure is as follows: DUID DST Cpkts 2ACK 2ART R-CNT Cmis Rmis DTime Figure7 Data structure maintained by the observing node DUID (Data pkt Unique ID): This is used to record the unique packet id of the sent Data packet. DST (Data pkt Sent Time) : This records the time at which Data packet is sent. 224
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME Cpkts: This gives the total number of Data packets that are sent. D2ACK: This records the Data packet ID for which the observing node has received the 2ACK packet i.e., 2ACK Packet is received for this Data packet. 2ART (2ACK Receive Time): This records the time at which the 2ACK packet is received. R-CNT: It counts the total number of 2ACK packets that are received by the observing node. Cmis: It counts the total number of Data packets for which the 2ACK packet is not received. Rmis: It is the ratio of the Cmis to the total number of Data packets sent, i.e., Cmis / Cpkts. Diff-Time: It is the difference of the time intervals 2ART and DST. At N1, each ID will remain on the record for τ seconds, the respite for 2ACK reception. If 2ACK bundles matching to this ID arrive in front the timer exits, the ID will be took out from the records. Other than, the ID will be taken out at the last of its look out time separation and a counter called Cmis will be incremented. If N3 receives a data bundle, then calculated whether it wants to send a 2ACK bundle to N1. In order to cut down the extra path overhead reason by the 2ACK outline, only a divide the data bundle will be acknowledged verses multi hop bundle. Such a divide termed the acknowledgment proportion, Rack. By changing Rack, we can dynamically tune up the overhead of Many-Hop bundle transmissions. The Data structure maintained by Data packet receiving node i.e., by Node N3 is as follows: DUID D-Total R-Status R2ACK_Total Rack Figure 8 Data structure maintained by the data packet receiving node (Node N3), i.e. 2ACK packet sender side DUID (Data pkt Unique ID) : This records received Data packet unique ID. D-Total: It counts the total number of Data Packets that are received. R-Status: This records the status of Data packets for which 2ACK packet is sent. R-status = 1 means for this DUID the receiving node has sent 2ACK packet and viceversa. 225
  • 14. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME R2ACK_Total: This field is used to count the total number of 2ACK packets that are sent. Rack: This field gives the ratio of the total number of data packets acknowledged to the total number of Data packets received, i.e., R2ACK_Total/D-total. Client N1 remarks the behavior of link N2→N3 for a session of time Tobs. At the last of the session, N1 determines the proportion of losing 2ACK bundles as Cmis / Cpkts and compare it with a threshold Rmis. If the proportion is greater than Rmis, link N2→N3 is announced misbehaving and that particular link is being removed from the routing table. The Data structure format of 2ACK is in the Figure 4.5. Since only a divide of the get data bundle are acknowledged, Rmis could simplify Rmis > 1 - Rack in order to neglect false alerts reason by such a partially acknowledgment technique. Every client getting such a 2ACK packet remarks the link N2→N3 as misbehaving and sums it to the black records list of such misbehaving links that it controls. When a client begins its own data traffic after, it will avoid using such misbehaving connects as a part of its path. DataPkt Src ID Data Pkt Dst ID Data Pkt ID Figure 9 Data structure of the 2ACK packet. B. TIMEOUT FOR MANY-HOP RECEPTION, Τ The argument timeout, τ, is need to set up a timer for 2ACK reception. If the timer dies before the expected 2ACK bundle is received, the absent 2ACK counter, Cmis, will be added. Hence, corresponding value of τ is significant for the successful work of the 2ACK scheme. It is shows that false alarms achieved if τ is too small. On the other base, if τ is too big, the waiting client will have to adjust big records, wanting a big memory space. Therefore, set a value which is large sufficient to the occurrence of temporary link fails (for e.g. the unsuccessful sending due to client wireless or local traffic congestion). τ > 4 * (single-hop transmission delay). (1) 226
  • 15. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME Where a single-hop transmission delay adds bundle sending delay, random back-down delay at the Medium Access Control (MAC) layer, data processing delay, and potential resending delay. C. OBSERVATION PERIOD, TOBS, AND DYNAMIC BEHAVIOR The 2ACK technique different link misbehavior and temporary link fails by detecting the reception of 2ACK bundles on a certain session of time, termed the detection session, Tobs. Since the impermanent link fails don’t use end long, such assumption is able to unlike impermanent link fails from link misbehavior. The value of Tobs should be large enough so that several 2ACK packets are sent from the multiple source to the destination client. This is particularly significant when the acknowledgment proportion, Rack, is light. For e.g., when Rack= 0.1, one 2ACK bundle will be sent for all 10 data bundles that are received. Even so, the watching session should not be too very short. A very long watching session means that the watching client takes big time to watch the behavior of the another-hop link in front not good behavior is stated. Data bundles may be felled over this lengthy session of time and the effective of the not good behavior detection algorithm is cut down. The 2ACK source has to send 2ACK packets for the total data session (on platform the acknowledgment proportion, Rack). Such continuous watching activity will help in the detection of not good behaving client which have active behavior depend on their power layers. When such client are good-behaved, the links closed with them will be treated as normal links and utilized. Once such clients misbehave, the links closed with them will be observed as not good behaving and other clients will stop using them. D. ACKNOWLEDGMENT RATIO, RACK The adding path overhead stimulated by the sending of the 2ACK bundles can be handled by the argument acknowledgment proportions, Rack, at the 2ACK bundle sender. With the use of the argument Rack in the 2ACK technique, only a divide of the received data bundles will be acknowledged. Hence, the parameter Rack supplies a technique to turn on the overhead. The decrease of overhead comes with a cost: the reducing of the range over which Rmis can get cost. When only one Rack of the data bundles gotten are 227
  • 16. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME acknowledged via the 2ACK packets, 1 - Rack of them are not acknowledged. So 1 - Rack of all data bundles are not acknowledged, Rmis >= 1 -Rack. i.e., Rmis > =1 – Rack (2) Hence, the different between Rmis and 1 – Rack as the buffer to control fells. i.e. Rack lowers the voltage extra space to fells down. E. PARTIAL DATA FORWARDING A misbehaving node may forward data packets partially by forwarding a fraction of the packets and try to cheat the monitoring system. Such a behavior will be detected by the 2ACK scheme. The triplet N1→ N2 → N3 is used as an example for explanation. Assume a misbehaving node N2 receives ND data packets from N1 successfully and only forwards a fraction of the data packets, say, Rpart (0 <= Rpart <= 1), of ND toward N3. Further assumption is that all data packets forwarded by N2 are successfully received by N3. Thus, N3 receives Rpart _ND data packets and only Rack _ Rpart _ ND of them will be acknowledged by 2ACK packets sent from N3. Therefore, in order to cheat the system, a misbehaving node N2 has to make sure that 1 - Rack. Rpart < Rmis. As the gap between 1 - Rack and Rmis shrinks, the feasible value of Rpart approaches 1. Therefore, the 2ACK scheme effectively guards against partial forwarding. Rpart > 1 – Rmis/Rack (3) Thus, by increasing 1-Rmis/Rack, force N2 to forward more data packets. The disadvantage of such an approach is the loss of protection from false alarms. F. OLSR PROTOCOL OLSR is a table-driven, link-state routing protocol that periodically advertises the links in the network. OLSR optimizes the link advertisement process by reducing the amount of advertised links and the number of nodes advertising them. OLSR also optimizes the message broadcasting mechanism by limiting message forwarding to Multi Point Relays (MPRs) only. [22] HELLO AND TC MESSAGES TRANSMISSION OLSR nodes become aware of one-hop and two-hops neighbors by continuously exchanging HELLO messages with their one-hop neighbors. MPR nodes are selected by 228
  • 17. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME each node in the network (called MPR Selector) as the minimum set of one-hop neighbors that allow reaching every two-hop neighbor via a node in the MPR set. MPR nodes optimize broadcasting and support path calculation. MPRs are the only nodes generating Topology Control (TC) messages and are also responsible for forwarding them. TC messages advertise the links between MPRs and MPR Selectors. The shortest path algorithm uses these links to construct paths for every MPR Selector. MPR selection process is as follows. MPR SELECTION MPRs form the core optimization in OLSR. The idea of MPRs is to minimize the overhead of flooding messages in the network by reducing the number of redundant retransmissions. Each node in the network selects a minimum set of nodes in its symmetric 1-hop neighborhood which retransmit its messages. This set is selected such that every symmetric 2-hop node can be reached via a node in this set. MPR set of selected neighbor nodes is called the MPR set of that node. The neighbors of the node which are not in its MPR set, receive and process broadcast messages but do not forward them. The smaller a MPR set, the lesser the control traffic overhead of the routing protocol. V. PERFORMANCE EVALUATION In the simulations, we used a version of Network Simulator (ns-2.34) [19] that includes wireless extensions developed by the CMU Monarch project group. We installed and modified the OLSR protocol in ns-2 to simulate misbehaving nodes. Unless specified otherwise, the 2ACK scheme used Rack=0.2. The IEEE 802.11 MAC was used 15 mobile nodes were randomly distributed in a 1500 m by 1500 m flat area. The source and the destination nodes were randomly chosen among all nodes in the network. The total simulation time was 100 seconds UDP traffics have been simulated to evaluate the performance of 2ACK. Constant Bit Rate (CBR) traffic was used. We used the following metrics to measure the performance of the 2ACK scheme with respect to UDP traffic:. Packet Delivery Ratio, PDR: the ratio of the number of packets received at the destination and the number of packets sent by the source. Routing Overhead, RO : the ratio of the amount of routing related transmissions (HELLO, TC, 2ACK and CBR) to 229
  • 18. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME the amount of data transmissions. The amounts are in bytes. Both forwarded and transmitted packets are counted. A. PACKET DELIVERY RATIO PDR: It is the ratio of the number of packets received at the destination and the number of packets sent by the source. In the Figure10 the Rack is 0.2 Table 1 The Relative Throughput Supported by 2ACK-OLSR and OLSR Pm 0.1 0.2 0.3 0.4 OLSR 0.895 0.775 0.655 0.536 2ACK- 0.950 0.950 0.950 0.950 OLSR In Table1, the relative throughput, normalized number of packets received is presented, when the 2ACK-OLSR scheme and the OLSR scheme are used. Based on Table1, the relative throughput reduces when pm increases due to higher chances of using routes with misbehaving links and longer time being spent to switch to good routes. From the table, it can be observe that the 2ACK-OLSR scheme outperforms the OLSR scheme in terms of relative throughput, especially in the networks with larger pm. It represents packet delivery ratio (PDR), the total number of data packets that are received. Figure 10 Packet Delivery Ratio of OLSR and 2ACK-OLSR at different misbehavior ratio. 230
  • 19. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME B. ROUTING OVERHEAD In the Figure11 the Rack is 0.2 Table 2 The Routing overhead by 2ACK-OLSR and OLSR 0.1 0.2 0.3 0.4 OLSR 0.280 0.294 0.307 0.318 2ACK- 0.700 0.700 0.700 0.700 OLSR In the Table 2 the routing overhead is increased as a misbehavior ratio increased in the case of OLSR. The routing overhead is calculated by using the formula as given HELLO + TC/CBR for different Pm. The routing is calculated for the 2ACK-OLSR by using the formula HELLO+TC+2ACK/CBR. The higher routing overhead in the 2ACK- OLSR scheme is due to the transmission of extra acknowledgment packets. VI. CONCLUSIONS The 2ACK scheme which helps detect misbehavior by a two hop acknowledgement. The 2ACK scheme is a network-layer technique to detect misbehaving links and to mitigate their effects. The 2ACK scheme detects misbehavior through the use of a new type of acknowledgment packet, termed 2ACK. Figure 11 Routing overhead of OLSR and 2ACK-OLSR at different misbehavior ratio. A 2ACK packet is assigned a fixed route of two hops (three nodes N1, N2, N3), in the opposite direction of the data traffic route. This technique identifies misbehaving nodes which had agreed to forward data packets originating from the source node but later refuse to do so during actual data transfer and it helps to reduce the routing overhead. The 2ACK technique is based on a simple 2-hop acknowledgment packet that 231
  • 20. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME is sent back by the receiver of the next-hop link. The 2ACK scheme can be used as an add-on technique to routing protocols such as OLSR in MANETs. One advantage of the 2ACK scheme is its flexibility to control overhead with the use of the Rack parameter. VII. FUTURE WORK In this work, focus is given only on link misbehavior. The more troublesome task is to determine the characteristics of a single node. The main reason behind this is the communication is only between two nodes, and is not any node’s sole act. So, any nodes associated with the misbehaving links should be punished carefully. In case of a link misbehaving, then any one of the two co-related nodes may be misbehaving in the association. In order to find the characteristics and punish a node, the behavior of links around that node should be analyzed. A second case may arise wherein Node N1 floods Node N2 with packets thus causing N2 to drop packets. Hence it is imperative that before declaring a node to be selfish on the basis of the number of packets dropped, compute the ratio of number packets received against the number of packets dropped should be computed. VIII. REFERENCES [1] Aad I., Hubaux J.-P., and Knightly E-W., “Denial of Service Resilience in Ad Hoc Networks,” Proc. MobiCom, pp. 202-215, 2004. [2] Baker M, Giuli T., Lai K. and Marti S., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, pp. 255-265, Aug. 2000. [3] Balakrishnan K., Deng J., and Varshney P. K., “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), pp.2137-2142 Mar. 2005. [4] Buttyan L. and Hubaux J. -P., “Security and Cooperation in Wireless Networks,” http://secowinet.epfl.ch/, 2006. [5] Buttyan L.and Hubaux J.-P., “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003. [6] Buttyan L. and Hubaux J.-P., “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc, pp, 255-265, Aug. 2000. 232
  • 21. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME [7] Buchegger S. and Le Boudec J.-Y., “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc, pp. 226-236, June 2002. [8] Buttyan L., Hubaux J.-P.,and Jakobsson M., “A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,” Proc. Financial Cryptography Conf., pp. 609-612, Jan. 2003. [9] Chiasserini C.F., Nuggehalli P., Srinivasan V., and Rao R.R., “Cooperation in Wireless Ad Hoc Networks,” Proc. INFOCOM, vol.2, pp. 808-817 Mar.-Apr. 2003. [10] Dipak Ghosal, Rose P. Tsang, and Stephen Mueller. “Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges in Performance tools and applications to networked systems” revised tutorial lectures 2004, Volume 2965, Pages 209-234, Year of Publication :2004, ISBN 3-540-21945-5 [11] Floyd S., Mathis M., Mahdavi J., and Romanow A., “RFC 2018 TCP Selective Acknowledgement Options,” technical report, PSC, LBNL, Sun Microsystems, Oct. 1996. [12] Jing Deng, Kejun Liu, Pramod K. Varshney, Fellow and Kashyap Balakrishnan. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs IEEE Transactions on Mobile Computing, Volume 6 , Issue 5 (May 2007) Pages 536-550, Year of Publication: 2007, ISSN: 1536-1233 [13] Miranda H. and Rodrigues L., “Preventing Selfishness in Open Mobile Ad Hoc Networks,” Proc. Seventh CaberNet Radicals Workshop, Oct. 2002. [14] Nahrstedt K. and Xue Y., “Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments,” Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367- 388, 2004. [15] Sundararajan T.V.P., Dr.Shanmugam A.” Performance Analysis of Selfish Node Aware Routing Protocol for Mobile Ad Hoc Networks”, ICGST-CNIR Journal, Volume 9, Issue 1, July 2009 [16] Haas Z.J. and L. Zhou and. Securing Ad Hoc Networks in IEEE Network Magazine, 1999.Volume 13, Nov./Dec. 1999, Issue 6. Pages.551-567, Year of Publication: 2003 ISBN: 0-8493-1332-5 233
  • 22. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May - June (2010), © IAEME [17] Nahrstedt K. and Xue Y., “Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments,” Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367- 388, 2004. [18] Sundararajan T.V.P., Dr.Shanmugam A.” Performance Analysis of Selfish Node Aware Routing Protocol for Mobile Ad Hoc Networks”, ICGST-CNIR Journal, Volume 9, Issue 1, July 2009 [19] The Network Simulator – ns-2 - http://www.isi.edu/nsnam/ns/ [20] Tutorial for Ns-2 - http://www.isi.edu/nsnam/ns/tutorial/ [21] NS by Example - http://nile.wpi.edu/NS/ [22] Unik olsrd homepage http://www.olsr.org 234