Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-72697-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks

Abstract: Abstract. Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. We present evaluation results that demonstr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(56 citation statements)
references
References 27 publications
(36 reference statements)
0
56
0
Order By: Relevance
“…of received messages. After getting a message a node will verify the tuple [24] (source, sequence no) of that message with those tuples in its buffer [13]. If anyone of them matches with that message then that node will reject that message silently.…”
Section: Description Of the Schemementioning
confidence: 99%
See 1 more Smart Citation
“…of received messages. After getting a message a node will verify the tuple [24] (source, sequence no) of that message with those tuples in its buffer [13]. If anyone of them matches with that message then that node will reject that message silently.…”
Section: Description Of the Schemementioning
confidence: 99%
“…Gonzalez [24] presents a methodology, for detecting packet forwarding misbehavior, which is based on the principle of flow conservation in a network. It states that if all neighbors of a node v j are queried for i) the amount of packets sent to v j for forwarding and ii) the amount of packets forwarded by v j to them, then the total amount of packets sent to and received from v j must be equal.…”
Section: Introductionmentioning
confidence: 99%
“…Misbehavior in Mobile Ad-Hoc networks using flow of conservation mechanism and done with protocol less implementation [11].…”
Section: ) Detection and Accusation Of Packet Forwardingmentioning
confidence: 99%
“…A ratio of (cmiss/cpkt) is calculated. To evaluate this ratio, we are using Principle of Flow Conservation mechanism [11] by setting the threshold value to this ratio as 20%, I.e. (cmiss/cpkt)<=20% (0.2), which is called the limit of tolerance.…”
Section: Designmentioning
confidence: 99%
“…Gonzalez et al [6] presents a methodology, for detecting packet forwarding misbehavior, which is based on the principle of flow conservation in a network. That states that if all neighbors of a node vj are queried for i) the amount of packets sent to vj to forward and ii) the amount of packets forwarded by vj to them, the total amount of packets sent to and received from vj must be equal.…”
Section: Related Workmentioning
confidence: 99%