Open Access Open Access  Restricted Access Subscription Access

Detection and Avoidance of Node Misbehavior in MANET Based on CLAODV


Affiliations
1 Sathyabama University, Chennai -600119, India
2 ECE Department SSN College of Engineering, Chennai- 603110, India
 

This paper depicts a model which not only evaluates the node's reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.

Keywords

RTS, CTS, Clone Node, Jitter , Throughput
User

  • Abderrezak Rachedi (2007) Cross-Layer approach to improve the monitoring process for mobile ad hoc networks based on IEEE 802.11. IEEE Globecom Proc. pp: 1086-1091.
  • Dipanjan Anupam J, Yelena Y and Tim F (2006) Toward distributed service discovery in pervasive computing environments. IEEE Trans. Mobile Computing. 5 (2), 97–112.
  • Marti S, Giuli TJ, Lai K and Baker M (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the 6th Annual ACM/IEEE Intl. Conf. on Mobile Computing & Networking. pp: 255– 265.
  • Mian AN, Baldoni R and Beraldi R (2009) A survey of service discovery protocols in multihop mobile ad hoc networks. IEEE Pervasive Computing. 8 (1), 66– 74.
  • Shakkottai S, Rappaport TS and Karlsson PC (2003) Wireless networks. IEEE Commun. Mag. 41, 74-80.
  • Ververidis CN and Polyzos GC (2008) Service discovery for mobile ad hoc networks: a survey of issues and techniques. IEEE Commun. Surveys &Tutorials. 10(3), 30–45.
  • Wang Y and Garcia-Luna-Aceves JJ (2002) Performance of collision avoidance protocols in single-channel ad hoc networks. In: Proc. of IEEE ICNP.
  • Xu K, Gerla M and Bae S (2003) Effectiveness of RTS/CTS Handshake in IEEE 802.11 based ad hoc networks. Ad Hoc Network.pp: 98-106.

Abstract Views: 489

PDF Views: 120




  • Detection and Avoidance of Node Misbehavior in MANET Based on CLAODV

Abstract Views: 489  |  PDF Views: 120

Authors

S. Usha
Sathyabama University, Chennai -600119, India
S. Radha
ECE Department SSN College of Engineering, Chennai- 603110, India

Abstract


This paper depicts a model which not only evaluates the node's reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.

Keywords


RTS, CTS, Clone Node, Jitter , Throughput

References





DOI: https://doi.org/10.17485/ijst%2F2011%2Fv4i10%2F30181