MAC-layer Acknowledgment as a Tool to Detect Routing Misbehavior
Subject Areas : Journal of Computer & Robotics
1 - Department of Electrical, Computer & IT, Islamic Azad University of Qazvin, Qazvin, Iran
Keywords:
Abstract :
[1] J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, M. Vetterli, Toward self-organized mobile ad-hoc networks: the terminodes project, IEEE Communications Magazine, pp. 118-124, 2001.
[2] R. L. Rivest, A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, Lecture Notes in Computer Science, Springer, pp. 69-87, 1997.
[3] S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, In Proc. of the 6th Annual ACM Int. Conf. on Mobile Computing and Networking (MobiCom’00, pp. 255-265), 2000.
[4] D. Djenouri, N. Badache, A novel approach for selfish nodes detection in MANETs: proposal and Petri nets based modeling, In 8th International Conference on Telecommunications – ConTEL, 2005.
[5] A. Josang, R. Ismail, C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, pp.618-644, 2007.
[6] S. Biswas, S. Datta, Reducing overhearing energy in 802.11 networks by low-power interface idling, In Proc. of the IEEE Int. Conf. on Performance, Computing, and Communications, 2004.
[7] LAN/MAN Standards Committee of the IEEE Computer Society, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, pp. 1-1233, 2007.
[8] D. B. Johnson, D. A. Maltz, Y. Hu, The dynamic source routing protocol for mobile ad-hoc networks (DSR), IETF Internet Draft, draft-ietf-manet-dsr-10.txt, 2004.
[9] L. Buttyan, J.-P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad-hoc networks, Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, 2001.
[10] S. Zhong, J. Chen, Y.-R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, In Proc. of IEEE INFOCOM’03, pp. 1987-1997, 2003.
Fig. 6. Packet delivery ratio of our scheme, 2ACK, and DSR in a 50-node network.
Fig. 7. Routing overhead of our scheme, 2ACK, and DSR in a 50 node network.
M. Keshavarz / MAC-layer Acknowledgment as a Tool to Detect Routing Misbehavior
102
[11] S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol, In Proc. of the 3rd ACM Int. Symp. on Mobile ad hoc networking & computing (MobiHOC’02), 2002.
[12] K. Balakrishnan, J. Deng, P. K. Varshney, TWOACK: Preventing selfishness in mobile ad hoc networks, In Proc. of IEEE Wireless Communications and Networking Conference (WCNC’05), 2005.
[13] K. Liu, J. Deng, P. K. Varshney, K. Balakrishnan, An acknowledgment-based approach for the detection of routing misbehavior in MANETs, IEEE Trans. on Mobile Computing, pp. 536-550, 2007.
[14] The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/.