A Misbehavior-Tolerant Multipath Routing Protocol for Wireless Ad ...
A Misbehavior-Tolerant Multipath Routing Protocol for Wireless Ad ...
A Misbehavior-Tolerant Multipath Routing Protocol for Wireless Ad ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong><br />
<strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
Hanie Sedghi, MohammadReza Pakravan, MohammadReza Aref<br />
Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran<br />
h.sedghi@ee.sharif.edu pakravan@sharif.edu aref@sharif.edu<br />
I. ABSTRACT<br />
Secure routing is a major key to service maintenance in ad hoc networks. <strong>Ad</strong> hoc nature exposes the network to several<br />
types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to<br />
behave selfishly. Selfish behavior can have drastic impacts on network per<strong>for</strong>mance. We have proposed a <strong>Misbehavior</strong>-<br />
<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior,<br />
wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to en<strong>for</strong>ce cooperation. In addition, it<br />
uses a novel data redirection method to mitigate the impact of node misbehavior on network per<strong>for</strong>mance. The proposed<br />
scheme promises establishing a safe route if network graph remains connected after eliminating the misbehaving nodes. We<br />
have implemented the proposed protocol in a simulation environment and have evaluated its per<strong>for</strong>mance in typical network<br />
configurations to demonstrate its resilience to node misbehavior.<br />
III. CONCLUSION<br />
The proposed protocol addresses several types of node misbehavior in ad hoc networks. Previously proposed schemes are<br />
of two types: ones who only use network overview and the others who only take care of security issues and fail to notice the<br />
whole network picture. The first advantage of our scheme is that it considers both aspects. It can there<strong>for</strong>e detect and punish<br />
misbehaviors: selfish attacks, wormhole, sinkhole, grey-hole and data repetition and modification in <strong>for</strong>warding phase.<br />
Moreover, in contrast to credit-based methods, several reputation-based methods and various previously suggested schemes,<br />
our solution does not need a center or a prior trust among nodes which makes it more suitable <strong>for</strong> ad hoc environment.<br />
Moreover, it does not require additional added complexity of extra hardware such as GPS or a precise global clock required<br />
by some other methods. Reputation-based methods share the goal to reduce the throughput of selfish nodes. Having reached<br />
this aim <strong>for</strong> all types of misbehavior addressed in this paper, we also introduced adaptive data redirection with a low<br />
overhead to minimize the impact of such adversaries on network throughput and service availability. The major advantage is<br />
that misbehavior detection and data redirection is per<strong>for</strong>med with minimum data loss. The strict confronting method used,<br />
reduces the opportunity of the misbehaving nodes to use network resources which leads to a higher incentive to cooperate and<br />
Quick Response Code<br />
Access this article online<br />
Website: www.ijrws.org<br />
ISSN<br />
Citation<br />
H. Sedghi, M.R. Pakravan , M.R. Aref, “A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong><br />
<strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks,” International Journal of Research in <strong>Wireless</strong><br />
Systems (IJRWS), Vol. 2, No. 2, pp. 6-15, June, 2013<br />
ISSN: 2320 - 3617<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 6
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
I. INTRODUCTION<br />
<strong>Wireless</strong> ad-hoc networks are becoming increasingly<br />
popular with a diverse range of applications. In many ad-hoc<br />
networks, nodes act as a source, destination or router of<br />
in<strong>for</strong>mation. There<strong>for</strong>e, a packet may pass multiple hops, being<br />
<strong>for</strong>warded by interim nodes acting as routers, to reach its<br />
destination. If some nodes within an ad-hoc network do not<br />
route properly, due to reasons such as selfishness, the network<br />
cannot function as expected. There<strong>for</strong>e, misbehavior of nodes<br />
can severely impact proper operation of the network.<br />
<strong>Ad</strong> hoc nature of the network implies that there are no<br />
infrastructures or central control system in the network. Also,<br />
nodes have limited radio range, computational power and<br />
battery power. This makes such networks vulnerable to several<br />
attacks such as wormhole, sinkhole, grey hole, impersonation,<br />
flooding, misleading routes and selfish attacks [1].<br />
Wormhole attack is believed to be one of the most severe<br />
active attacks. Attacks per<strong>for</strong>med by malicious nodes who<br />
deliberately try to harm network per<strong>for</strong>mance are called<br />
active. Wormhole is the creation of a tunnel between two<br />
colluding nodes linked through a private network connection.<br />
This exploit allows them to short-circuit the normal flow of<br />
routing messages by falsifying the widely-used hop count<br />
metric [2].<br />
One prominent idea <strong>for</strong> detecting a wormhole was based<br />
on packet leashes [3]. This scheme needs authenticating either<br />
an extremely precise timestamp or location in<strong>for</strong>mation<br />
combined with a loose timestamp. There<strong>for</strong>e it is not<br />
applicable in ad hoc networks. Another approach uses hash<br />
chain and public key infrastructure to detect a wormhole [4].<br />
As a result of ad hoc nature, a CA (Certificate Authority) is<br />
not an easily applicable assumption. There<strong>for</strong>e public key<br />
infrastructure implementation is a challenge. Moreover, the<br />
scheme falsely accuses all benign nodes that happen to be on<br />
the same route as the wormhole.<br />
In many types of ad hoc networks, nodes have limited<br />
energy and computational power. There<strong>for</strong>e, nodes will benefit<br />
from executing algorithms that keep their resources to<br />
themselves and that may result a selfish behavior in the<br />
network. Selfish nodes may not participate in routing data<br />
packets that does not belong to them, saving their resources. A<br />
game-theoretic approach to encourage energy sharing <strong>for</strong><br />
packet <strong>for</strong>warding is proposed in [5]. Selfish behavior<br />
introduces a type of denial of service (DoS) attack. In addition<br />
to denial of service, selfish behavior results in route loss, data<br />
loss, throughput reduction and in the worst case, network<br />
decomposition. It should be noted that, in comparison with<br />
other known attacks, this attack is not per<strong>for</strong>med by nodes that<br />
have the tendency to hurt network, namely malicious nodes. It<br />
is done by normal nodes who behave rationally to save their<br />
resources. Considering the mentioned threats, it is of high<br />
importance to mitigate these types of misbehavior.<br />
Most ad hoc networks are composed of individual nodes all<br />
having the same priority. There<strong>for</strong>e, preventing selfishness can<br />
be reached by en<strong>for</strong>cing cooperation [6]. These methods can be<br />
divided to credit-based methods and reputation-based methods.<br />
Credit-based methods use economic incentives to encourage<br />
packet <strong>for</strong>warding. Cooperation is a service that can be<br />
evaluated and charged. They use a virtual currency which is<br />
implemented by either a tamper-proof hardware -virtual money<br />
- or a virtual bank. When a node wants to send a packet, it<br />
needs to have the money required by intermediate nodes [7],<br />
[8], [9]. Reputation-based methods are based on building<br />
reputation amongst nodes. Packet <strong>for</strong>warding increases node<br />
reputation. Only nodes having good reputation can send their<br />
data in the network and the route having the highest reputation<br />
is chosen. There<strong>for</strong>e selfish nodes are punished and isolated<br />
[10] [11] [12] [13] [14]. These methods use two types of<br />
in<strong>for</strong>mation: reputation in<strong>for</strong>mation received from other nodes<br />
and first hand in<strong>for</strong>mation which is the knowledge acquired by<br />
monitoring neighbors' behavior [6], [12]. Some reputationbased<br />
schemes use the idea of watchdog and pathrater [13].<br />
Another approach introduced recently, is a proactive<br />
cooperation mechanism to detect and punish selfish power off<br />
[15]. The method cannot detect more sophisticated selfish<br />
attacks like selfishness type II that will be introduced shortly.<br />
We propose a robust multipath routing protocol which<br />
detects all types of wormhole and selfishness known so far<br />
with low data loss. Utilizing a proactive approach, we apply<br />
the idea of reputation which is updated based on first hand<br />
in<strong>for</strong>mation and a simple but thorough method <strong>for</strong> earning and<br />
losing it. Proposed routing protocol uses an adaptive rerouting<br />
method to prevent complex misbehavior impacts, and also<br />
guarantees establishing a safe route if network graph remains<br />
connected after eliminating misbehaving nodes. We have<br />
implemented the protocol in a simulation environment and<br />
have evaluated its behavior in realistic network scenarios.<br />
The proposed method has the following salient features:<br />
1. It is simple and does not require a trusted third party, prior<br />
trust among nodes, GPS, precise clock and similar<br />
requirements which add to the system complexity.<br />
2. It can detect and bypass wormholes, sinkholes and greyholes<br />
successfully with a low overhead.<br />
3. It can accurately detect and re-act properly to both types of<br />
known selfish node behaviors. Most papers have not been<br />
completely successful in addressing both types.<br />
4. It uses first hand in<strong>for</strong>mation which are obtained by a node<br />
itself and that prevents issues that could arise from rumor<br />
spreading.<br />
5. Wormhole or selfish nodes neighbors are not wrongly<br />
accused.<br />
6. It does Dynamic Rerouting with minimum data loss to<br />
defend network per<strong>for</strong>mance against data packet drop<br />
attacks.<br />
7. It does multipath routing to decrease rerouting overhead<br />
and achieves that with far less overhead compared to ideas<br />
applied be<strong>for</strong>e.<br />
8. It works well under congestion or link failures, temporary<br />
or long-lasting.<br />
9. It can be easily implemented on a 802.11 MAC.<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 7
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
As a side improvement, we design a slightly more<br />
intelligent TCP, which <strong>for</strong>tifies our system greatly while<br />
defending against wormhole attack and makes our idea to<br />
outper<strong>for</strong>m all existing protocols.<br />
The remainder of this paper is organized as follows: Part<br />
two gives an overview of considered attacks and their impacts<br />
on network. <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> (MTMR)<br />
protocol is introduced in part three. In part four we prove some<br />
of MTMR properties. Part five defines simulation software,<br />
scenarios and results. Finally we conclude the paper in part six.<br />
II. CONSIDERED ATTACKS<br />
A. Wormhole<br />
Wormhole is the creation of a tunnel between two colluding<br />
nodes linked through a private network connection. The<br />
colluding nodes pretend to be neighbors while they are far<br />
from each other. There<strong>for</strong>e, if a routing protocol exploits hopcount<br />
metric, wormhole will always be interesting and<br />
selected to be on the routes. The attraction of network traffic<br />
to wormhole is regarded as if wormhole is short circuiting<br />
network traffic. Hop-count is a common metric used by most<br />
routing protocols. A wormhole pair can disrupt on average<br />
32% of all communications across the network [4]. Most<br />
proposed routing protocols have no means to detect<br />
wormholes or rely on not applicable or unfair ideas. The worst<br />
case attack happens when colluding nodes <strong>for</strong>ward route<br />
discovery messages but refuse to <strong>for</strong>ward data packets. This<br />
subtle misbehavior drastically degrades network per<strong>for</strong>mance.<br />
B. Selfishness<br />
Selfish behavior addressed so far, can be classified into two<br />
categories that are called selfishness type I and II. In the type I<br />
selfish behavior, the selfish node does not participate in route<br />
discovery process to avoid being on the route. This behavior<br />
has also been named selfish power off. In the type II selfish<br />
behavior, the selfish node participates in route discovery phase,<br />
<strong>for</strong>warding the control packets it receives but refuses to<br />
<strong>for</strong>ward data packets. In addition, a node may change its<br />
behavior based on its remaining power, to act as a benign node<br />
first and change to being selfish based on its remaining power.<br />
Form our algorithm perspective; this will not make the process<br />
more complicated. A detailed explanation follows shortly.<br />
Selfish behavior degrades fairness in the network. Benign<br />
nodes consume their power in processing and <strong>for</strong>warding<br />
packets of other nodes. In contrast, selfish nodes ignore other<br />
packets to keep their power to themselves. Moreover,<br />
selfishness makes benign nodes consume more energy.<br />
Considering selfishness type I, benign nodes will participate in<br />
more routes. If data retransmission is an issue in upper layers,<br />
Selfishness type II makes benign nodes <strong>for</strong>ward more data<br />
packets. This includes the source node and intermediate nodes<br />
on a route that contains a selfish node type II.<br />
C. Sinkhole and Grey-hole<br />
In the sinkhole attack, the attacker spreads wrong routing<br />
in<strong>for</strong>mation to attract network traffic to itself and discards the<br />
received traffic. A more complex <strong>for</strong>m is the grey-hole attack,<br />
where the colluder <strong>for</strong>wards routing messages but discards<br />
data packets to keep its false route.<br />
Wormhole and Selfish attacks can have devastating effects<br />
on the per<strong>for</strong>mance of ad hoc networks which can be<br />
classified as a Denial of Service Attack. They can lead to<br />
network decomposition. Selfish power off may lead to failure<br />
in discovering a route. Wormhole and Type II selfishness<br />
attacks decrease packet delivery ratio drastically. Sinkhole and<br />
grey-hole can be considered as moderate wormhole attacks.<br />
III. MTMR PROTOCOL<br />
We propose a misbehavior-tolerant multipath routing<br />
protocol. Two major approaches are introduced in MTMR.<br />
First of all a proactive cooperation en<strong>for</strong>cement method is used<br />
to detect and punish misbehaviors and reward cooperation.<br />
Secondly, an adaptive data redirection method is used to<br />
mitigate offender's impact on network per<strong>for</strong>mance.<br />
A. Cooperation en<strong>for</strong>cement<br />
Cooperation en<strong>for</strong>cement is based on local measurements.<br />
In addition to a noticeable reduction in transmission and<br />
processing overhead, this approach makes network resilient to<br />
several attacks such as rumor spreading. Every node monitors<br />
its one-hop neighbors' relevant transmissions and based on<br />
their cooperation traces (CT), decides whether to cooperate<br />
with them or not. This routine is per<strong>for</strong>med be<strong>for</strong>e routing<br />
decisions.<br />
The scheme is based on 5 basic operations.<br />
A table <strong>for</strong> keeping the traces: Each node maintains a table<br />
<strong>for</strong> its neighbors. The table contains node identity and the<br />
corresponding CT of its neighbors as shown in table1. Traces<br />
decrease in time so that a node who behaves well temporarily<br />
cannot take advantage of the given reputation <strong>for</strong> the rest of its<br />
presence in the network.<br />
2) A cooperation decision procedure: Received packet is<br />
processed and <strong>for</strong>warded if and only if sender cooperation trace<br />
is not zero.<br />
3) A procedure to give CTs. We apply different strategies<br />
<strong>for</strong> adding or removing CTs based on packet type.<br />
Control Packets: If a node receives a control packet from a<br />
neighbor who is not the packet source, it shows the<br />
corresponding neighbor is cooperating, so the receiver<br />
increases the neighbor's CT.<br />
Data packets: Whenever a node <strong>for</strong>wards a data packet to a<br />
neighbor, it keeps track of the behavior of its neighbor. If the<br />
next hop <strong>for</strong>wards the packet, it is granted CT and if it refuses<br />
to <strong>for</strong>ward the packet, its CT is reset. It should be noted that<br />
this observation is per<strong>for</strong>med by adding the sent packets to a<br />
buffer. Each buffer entry has a timer assigned to it. Packets<br />
<strong>for</strong>warded by neighbors (which in wireless medium can be<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 8
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
received by the source as well as the next hop) are compared to<br />
buffer entries. If the <strong>for</strong>warded packet is in the buffer, the entry<br />
is removed and the neighbor is granted a CT. On the other<br />
hand, if the timer is reset, it shows neighbor misbehavior and<br />
neighbor CT is reset. This approach <strong>for</strong>tifies the protocol<br />
against attacks that modify or repeat data packets in <strong>for</strong>warding<br />
phase. The key idea is that if the misbehaving node changes or<br />
repeats the data packet, the new packet is not in the sender's<br />
buffer and the offender does not gain CT <strong>for</strong> that. In addition, if<br />
the offender does not <strong>for</strong>ward the original packet at all, after<br />
corresponding buffer entry’s timer is expired, its CT is reset.<br />
CT is the key <strong>for</strong> acceptance in network. According to the<br />
cooperation decision procedure, if a node's CT is zero, the<br />
neighbor will not cooperate with it and such a node is<br />
punished. Considering nodes' limited resources, punishment<br />
entices such misbehaving nodes to act well.<br />
Granting CT is achieved by increasing node’s CT by size of<br />
packet cooperation value if the node is already in CT table, or<br />
by adding the neighbor to the CT table and giving it a CT equal<br />
to packet cooperation value in the other case. Different packet<br />
types have different cooperation values.<br />
4) A procedure to reset CTs: as mentioned above, CTs are<br />
decreased in time and reset if an offence is noticed. There<strong>for</strong>e<br />
occasions may occur when parts of the network CTs have<br />
decreased in time and become zero. In such cases, a deadlock<br />
happens.<br />
5) A deadlock solution: Occasions may occur when a node<br />
or a part of network cooperation traces are expired. In this<br />
situation a deadlock occurs. To avoid this, when a source node<br />
detects a deadlock (by having its RREQ expired without<br />
receiving a RREP), it sets a Cooperation Request (CR) flag in<br />
its RREQ packet and broadcasts the RREQ. A neighbor<br />
detecting the flag from a source gives it a temporary CT and<br />
increases the counter <strong>for</strong> its credit requests, CR counter. A<br />
granted CT’s value is less than <strong>for</strong>warding packet CTs.<br />
Moreover <strong>for</strong> each neighbor there is a limit on the number of<br />
CRs a node reacts to.CR flag is placed at RREQ packet's first<br />
hop field. The reason is that, this field is used in AOMDV [16]<br />
protocol but is not used in MTMR protocol.<br />
Table I. Cooperation Trace table<br />
Neighbor ID CT CR Counter<br />
N1 170 0<br />
N5 300 2<br />
… … …<br />
It should be noted that MTMR is fair and every node has<br />
the chance to join network by <strong>for</strong>warding packets <strong>for</strong> others.<br />
Since cooperation en<strong>for</strong>cement procedure is per<strong>for</strong>med be<strong>for</strong>e<br />
routing, edge nodes (i.e. nodes that are located at networks<br />
borders or are rarely chosen to be on a route) can gain CT by<br />
<strong>for</strong>warding RREQs be<strong>for</strong>e duplicates are ignored by routing<br />
procedure. There<strong>for</strong>e, border nodes and malfunction nodes are<br />
treated fairly. If some nodes are subject to some errors in MAC<br />
layer, this fairness helps them too.<br />
B. <strong>Multipath</strong> <strong>Routing</strong> and Data Redirection<br />
In order to minimize the impact of node misbehavior on<br />
network per<strong>for</strong>mance, it is not enough to punish offenders. It is<br />
needed to defend benign nodes throughput by finding safe<br />
routes. In order to reach this goal, we include a connection<br />
discovery phase in the protocol. A connection is a safe path<br />
without any misbehaving nodes. Connection discovery phase<br />
has two parts: route discovery and data redirection. Our<br />
multipath routing protocol is based on AOMDV (<strong>Ad</strong> hoc Ondemand<br />
<strong>Multipath</strong> Distance Vector) [16] but there are major<br />
differences. Like all other on-demand routings, when a source<br />
node wants to establish a connection, it broadcasts a Route<br />
Request packet (RREQ). Every node receiving a fresh copy of<br />
RREQ, updates its routing table with a new path to the source,<br />
and then searches its routing table to find a path to the<br />
destination. If a path is not found, it rebroadcasts the RREQ<br />
packet. Whenever a route to the destination is found or RREQ<br />
packet arrives at the destination, a Route Reply packet (RREP)<br />
is generated and sent to the source node. Unlike the AOMDV<br />
protocol who only finds at maximum three routes to the<br />
destination and sends back RREP on those discovered routes,<br />
we broadcast RREP packet to some hops. This is done so that<br />
nodes surrounding the discovered route get the in<strong>for</strong>mation<br />
about destination whereabouts. This modification is of great<br />
importance to implement the data redirection method.<br />
Source responds to the first received RREP packet. The<br />
ones coming afterwards are only used <strong>for</strong> updating routing<br />
tables. After receiving the route reply packet, source checks the<br />
first entry in the routing table <strong>for</strong> the desired destination. It also<br />
checks the corresponding next hop CR, if the CR is not zero;<br />
source <strong>for</strong>wards the packet to the specified next hop.<br />
Otherwise, the second best next hop is analyzed and so on.<br />
This approach is followed by the intermediate nodes as well.<br />
A fresh copy is a copy of a RREQ/RREP that has not been<br />
received from the same neighbor be<strong>for</strong>e. Utilizing this<br />
definition along with sequence number and hop count assures<br />
loop freedom.<br />
If the discovered route contains a disobedient node, data<br />
packets will be retransmitted and redirected. In order to avoid<br />
loop in data redirection phase, data packets contain a sequence<br />
number. Sequence number also in<strong>for</strong>ms the intermediate node<br />
that the copy is a fresh copy, here, a retransmitted data packet.<br />
Considering mentioned procedures, data redirection is a<br />
straight<strong>for</strong>ward decision. Any node receiving a fresh data<br />
checks its routing table and finds the first benign neighbor, i.e.<br />
the neighbor that owns a CR, and <strong>for</strong>wards the packet to it. If<br />
such a neighbor is not found, the node sends back the last data<br />
packet to the previous hop. In addition to optimizing data<br />
redirection, this operation prevents previous hop from falsely<br />
accusing the specified node. And hence, prohibits selfish<br />
spread. Selfish spread is the act of accusing benign nodes when<br />
they have no access to secure paths and thus do not <strong>for</strong>ward<br />
packets. Several misbehavior detection mechanisms such as [4]<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 9
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
suffer from this imperfection. Moreover, this algorithm assures<br />
stopping the data transmission in case of congestion or when<br />
the attack is so severe that the network is decomposed. As can<br />
be seen, this abrupt redirection <strong>for</strong>tifies the system against the<br />
third type of selfishness.<br />
This strategy promises minimum data loss. The reason is<br />
that, even if a misbehaving node exists on the path and it has a<br />
fake cooperation trace as a result of a CR, as soon as it drops<br />
the first data packet, previous hop is in<strong>for</strong>med. Previous hop<br />
then resets the CT of misbehaving node and will not send the<br />
next data packet through the discovered misbehaving node.<br />
IV. MTMR PROPERTIES<br />
We introduce 6 properties of MTMR and provide heir<br />
proofs.<br />
Property I: If MTMR discovers a route between a source<br />
and its destination, the path is secure, i.e. it does not include<br />
misbehaving nodes.<br />
Proof I: Obviously, misbehaving nodes do not cooperate in<br />
<strong>for</strong>warding control or data packets. There<strong>for</strong>e, considering<br />
route discovery and connection discovery phase, selfish nodes<br />
type I will not be on the discovered route. Moreover, if a node<br />
is selfish type II, wormhole or sinkhole, it will be bypassed in<br />
rerouting of connection discovery phase. Consequently, only<br />
the nodes that <strong>for</strong>ward data and ACK packets as well as<br />
RREQ and RREP packets can participate in a MTMR<br />
connection. Applying indirect proof, suppose that a<br />
misbehaving node resides on a MTMR route, there<strong>for</strong>e, it will<br />
at least ignore <strong>for</strong>warding data packets or drops data packets.<br />
Noting the operation of MTMR as explained be<strong>for</strong>e, such a<br />
node can not be included in an MTMR path. This<br />
contradiction completes the proof.<br />
Property II: If MTMR discovers a route between source and<br />
destination, then at least one path exists from the source to the<br />
destination in the induced graph which is made by removing<br />
misbehaving nodes.<br />
Proof II: It can be easily deduced from property I that a<br />
MTMR-discovered path does not include misbehaving nodes.<br />
There<strong>for</strong>e, the path that MTMR has discovered remains in the<br />
induced graph which is made by removing misbehaving nodes<br />
and it will not be cut. Hence, the statement is true.<br />
Property III: For every intermediate ad hoc node, MTMR<br />
protocol checks all of its neighbors once.<br />
Proof III: MTMR protocol strategy is as follows: If the<br />
intermediate node is connected to the destination, the source<br />
sends data to this node until the node tells the previous hop<br />
that it has processed all paths and cannot find a path to reach<br />
the destination. There<strong>for</strong>e, the intermediate node rejects the<br />
data packet by returning it to the previous hop.<br />
After receiving a data packet towards the destination (D),<br />
intermediate node chooses the next hop specified by its table<br />
index <strong>for</strong> D. It always checks next hop CR be<strong>for</strong>e <strong>for</strong>warding<br />
the packet. If the next hop specified by the table does not have<br />
a CR, the next table entry is checked and so on. If the<br />
intermediate node checks all the entries and does not find a<br />
benign next hop, it gives back the data packet. We apply<br />
inductive reasoning to show that. As induction assumption,<br />
suppose that if intermediate node is destination's k-th level<br />
neighbor (i.e. it is k-hop away from destination), all of its<br />
neighbors will be checked. Now consider the intermediate<br />
node of level k+1. Because of our limited directive flooding,<br />
all of this node's table entries <strong>for</strong> D are of level k. (Limited<br />
directive flooding means that in flooding phase, every node<br />
<strong>for</strong>wards the received RREQ/RREP to all its neighbors except<br />
the node that had flooded that packet in the previous step).<br />
According to induction assumption, all the neighbors <strong>for</strong> a<br />
node of level k are checked and finally that node sends a<br />
return message to the k+1-th level node .This way, the k+1-th<br />
level neighbor checks all its neighbors.<br />
Property IV: MTMR does not process any route twice.<br />
Proof IV: Since routes are processed solely by nodes that<br />
participate in them, if a route is processed twice it means there<br />
exists an intermediate node that has checked a specific<br />
neighbor twice. According to property III such a case is not<br />
possible. Since source node can be considered the last<br />
intermediate node (from destination side), it can be easily<br />
concluded from induction that there is no such probability <strong>for</strong><br />
the source node too.<br />
Property V: Data packets follow the same path as RREQ<br />
packets.<br />
Proof V: This is due to the fact that intermediate nodes<br />
direct their routing tables as RREQ packets are flooded in the<br />
network.<br />
Property VI: MTMR processes loop-free routes.<br />
Proof VI: Considering the utilized strategy in route<br />
discovery phase, RREQ packets do not follow loops. The<br />
reason is that MTMR uses loop avoidance mechanisms such<br />
as SQN (Sequence Number) and limited directive flooding.<br />
There<strong>for</strong>e, as a result of property V, data packets do not follow<br />
loops.<br />
V. SIMULATION<br />
Credit-based methods may not be appropriate <strong>for</strong> ad hoc<br />
nature. That is due to the fact that ad hoc networks lack<br />
infrastructure and certificate distribution centers. There<strong>for</strong>e,<br />
ideas based on virtual currency or virtual bank will be difficult<br />
to implement in such networks. Moreover, there is no<br />
guarantee that intermediate nodes receive source money. It has<br />
been verified that if node density is not low, AODV [17]<br />
based multipath routing protocols (such as AOMDV) achieve<br />
a better per<strong>for</strong>mance and less routing overhead than DSR [18]<br />
based multipath routing protocols [19]. Data redirection has<br />
only been applied in [12] and it is based on DSR. There<strong>for</strong>e,<br />
since MTMR is based on AODV, it uses a very low routing<br />
overhead compared to previously introduced schemes.<br />
Moreover, it uses a multipath routing method which is an<br />
efficient method in networks facing link breakage or mobility<br />
[16]. It also imposes less monitoring and processing load to<br />
the neighbor nodes compared to some watchdog based<br />
protocols [12], in which every node has to monitor all<br />
neighbors' traffic even when not addressed to it. Proactive<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 10
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
cooperation mechanism used in [15] can only detect selfish<br />
power off. Proposed scheme does not use a threshold <strong>for</strong><br />
detection. Threshold-based decisions [14] give misbehaving<br />
nodes the opportunity to use network resources.<br />
There<strong>for</strong>e, to inspect proposed scheme behavior, MTMR is<br />
compared to defenseless scenario, AOMDV routing protocol.<br />
This is to inspect the pros and cons of intended misbehavioraware<br />
routing.<br />
We have designed a new network simulator named MARS:<br />
MAnet <strong>Routing</strong> Simulator to investigate the per<strong>for</strong>mance of<br />
the proposed protocol in realistic network scenarios. MARS is<br />
written in Visual C++ programming language and is designed<br />
<strong>for</strong> comparing different mobile ad hoc networks routing<br />
protocols. For the physical layer we used two-dimensional<br />
ground model and MAC layer is based on 802.11b. MARS<br />
benefits from a visual environment. Various network topology<br />
and node behavior parameters can be chosen by user. Packet<br />
exchange can be verified during simulation. Different paths<br />
traced by packets are shown with different colors.<br />
As stated in [16], AOMDV discovers "link-disjoint" paths.<br />
Rerouting is triggered in case of link breakage and considering<br />
the routing overhead, the best number <strong>for</strong> discovered paths is<br />
three. If the transport layer uses TCP protocol, it stops packet<br />
retransmission after 5 consecutive unacknowledged data<br />
packets [20].<br />
MTMR to ITAOMDV as well as AOMDV in case of<br />
wormhole attack.<br />
Figure 1 One Traffic scenario, AOMDV protocol failure in case of one<br />
selfish node type II<br />
Figure 2 One Traffic scenario, MTMR success in detecting and bypassing the<br />
selfish node type II<br />
A. Overview<br />
First consider the network shown in figure 1. Network<br />
consists of 50 randomly positioned nodes. Node 6 is traffic<br />
source and node 30 is the destination. Both routing protocols<br />
are investigated: In case of AOMDV protocol if only one<br />
selfish node type II is present in the route, it will ignore all<br />
data packets and the source will not be aware of that. This is<br />
shown in figure1. Node 8 is the selfish node. Packet<br />
transmission is stopped by TCP after 5 consecutive<br />
unacknowledged data packets. RREQ traces are shown in<br />
blue. RREP, data and Ack packets traces are shown with<br />
yellow, pink and green consecutively.<br />
Figure 2 shows how MTMR reacts to the defined scenario.<br />
Node 18 detects the selfish node after it drops the first data<br />
packet and redirects the consequent data packets to node 39.<br />
As mentioned be<strong>for</strong>e, increasing the number of selfish node<br />
does not cause failure in discovering a safe route provided that<br />
network graph containing source and destination remains<br />
connected after eliminating selfish nodes.<br />
B. Wormhole Detection<br />
We propose a cross layer approach to improve AOMDV's<br />
per<strong>for</strong>mance in case of wormhole attack. Generally, if the<br />
transport layer uses TCP protocol, it hinders data<br />
retransmission when 5 packets are timed out. We design a<br />
more intelligent TCP that triggers redirection in case of 5<br />
consecutive unacknowledged packets. We call this cross layer<br />
design, Intelligent TCP AOMDV (ITAOMDV). We compare<br />
The considered sample network consists of 50 nodes<br />
randomly placed over a 100*100 m 2 area. Each node has a<br />
transmission range of 10 m. Each traffic session is assumed to<br />
contain 1000 data packets. We define Packet Delivery Ratio<br />
(PDR) as number of Ack. packets divided by number of<br />
generated data packets and we use it as the comparison<br />
benchmark. If no benign path exists between source and<br />
destination, MTMR refuses to send any data packets and we set<br />
PDR=0. Moreover, we assume that transport layer prohibits<br />
AOMDV from sending more than 5 unacknowledged packets.<br />
A Randomly placed wormhole is added to the network. All<br />
traffics attracted to the wormhole were taken into account <strong>for</strong><br />
different wormhole locations. The simulation is repeated 20<br />
times. Table 2 shows the simulation results. Note that, in our<br />
proposed protocol, failure detection and data redirection is<br />
per<strong>for</strong>med at the network layer, while AOMDV and<br />
ITAMODV execute one of the tasks (if any) at a higher layer.<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 11
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
There<strong>for</strong>e, as a rule of thumb, our proposed protocol reacts to<br />
failures faster than AOMDV and its intelligent version,<br />
ITAOMDV.<br />
As stated be<strong>for</strong>e, discarding only one data packet is enough<br />
<strong>for</strong> a misbehavior-aware node, i.e. a node following MTMR<br />
protocol, to redirect the data stream. On the other hand, if the<br />
first hop is changed during data redirection, since wormhole<br />
has advertised a low hop count, the new first hop may try the<br />
wormhole. There<strong>for</strong>e the average data loss <strong>for</strong> traffics attracted<br />
to a wormhole is a little higher than 1. The strict data<br />
redirection property of the MTMR algorithm leads to reliable<br />
detection of all misbehaving nodes. Noting that in the<br />
simulation scenarios, there is only one wormhole and since our<br />
proposed protocol checks all available next hops in case of a<br />
data packet drop, the data redirection is completely successful.<br />
(Assuming that wormhole node is not the only neighbor of the<br />
source).<br />
Focusing on AOMDV's row we see that, TCP prohibits<br />
sending data after 5 unsuccessful tries. There<strong>for</strong>e, if a traffic is<br />
attracted to wormhole, packets will be lost and TCP stops the<br />
traffic after five timeout packets. As a result, PDR would be<br />
zero and data loss would be the same 5.<br />
If we consider Intelligent TCP AOMDV, both failure<br />
detection and data redirection are triggered by TCP. Since<br />
AOMDV discovers link-disjoint paths, if there is only one<br />
wormhole present in the network, the second path will not use<br />
that link and data loss will be 5. But according to figure 3, this<br />
per<strong>for</strong>mance degrades drastically when the number of<br />
wormholes increases. The reason is that AOMDV at maximum<br />
finds three link-disjoint paths. There<strong>for</strong>e, if three wormhole<br />
pairs exist near the desired traffic, they will be chosen by<br />
AOMDV and data redirection fails after ITAOMDV tries all of<br />
them. On the contrary, since proposed protocol considers all<br />
existing paths, it has the chance to find a safe route at the<br />
fourth attempt.<br />
Proposed<br />
protocol<br />
AOMDV<br />
ITAOMDV<br />
Table II. Wormhole Detection<br />
Failure<br />
Detection<br />
Data<br />
Redirection<br />
Average<br />
PDR<br />
Network<br />
layer<br />
Transport<br />
layer<br />
Transport<br />
layer<br />
Network<br />
layer<br />
Average<br />
Data Loss<br />
0.99867 1.3<br />
No 0 5<br />
Transport<br />
layer<br />
0.78324 5<br />
Next, we analyze network average PDR when more than<br />
one wormhole pair exists in the network. Previously- defined<br />
random network is analyzed <strong>for</strong> different number of wormhole<br />
pairs and random locations. For a specific number of wormhole<br />
pairs, the results are averaged <strong>for</strong> 10 different wormhole<br />
locations and network traffics. Network PDR is illustrated in<br />
figure 3. It can be seen that ITAOMDV is more resilient to<br />
wormhole attack than traditional AOMDV. Obviously our<br />
proposed scheme outper<strong>for</strong>ms both AOMDV versions and<br />
provides a much better per<strong>for</strong>mance against wormhole attacks.<br />
Figure 4 compares data loss rate of three protocols in case<br />
of wormhole attack. It can be easily deduced that the proposed<br />
solution minimizes data loss. For ITAOMDV and AOMDV,<br />
there is a tradeoff between PDR and data loss. ITAOMDV<br />
sustains network per<strong>for</strong>mance by reducing PDR deprivation,<br />
but this benefit results in a higher data loss rate compared to<br />
AOMDV. It can be concluded that the proposed protocol<br />
outper<strong>for</strong>ms the previous protocols and prohibits misbehaving<br />
nodes from degrading network per<strong>for</strong>mance.<br />
Network Packet Delivery Ratio<br />
1<br />
0.98<br />
0.96<br />
0.94<br />
0.92<br />
0.9<br />
0.88<br />
0.86<br />
0.84<br />
0.82<br />
Figure 3<br />
Figure 4<br />
Network PDR in presence of wormhole pairs<br />
0.8<br />
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5<br />
Data loss<br />
100<br />
90<br />
80<br />
70<br />
60<br />
50<br />
40<br />
30<br />
20<br />
10<br />
Proposed protocol<br />
ITAOMDV<br />
AOMDV<br />
No. of wormhole pairs<br />
Data loss in case of wormhole attack<br />
Proposed protocol<br />
ITAOMDV<br />
AOMDV<br />
0<br />
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5<br />
No. of wormhole pairs<br />
C. Per<strong>for</strong>mance of Benign nodes<br />
We utilize the same random network mentioned be<strong>for</strong>e<br />
with 10 traffics initiated randomly between 10 randomly<br />
selected pairs. Each traffic stream contains 1000 data packets.<br />
Randomly selected selfish nodes are added to the network.<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 12
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
Since 20 nodes are selected to participate in benign traffic pairs<br />
and there are 50 nodes in the network, selfish nodes can be up<br />
to 60% of network nodes.<br />
Two attacks are simulated. In the first case, network is<br />
subject to selfish attack type II, the second shows network<br />
behavior in the presence of a more complex attack in which<br />
selfish nodes are of both types. Each attack is simulated 30<br />
times.<br />
Figure 5 shows the PDR of the considered traffic streams. It<br />
is obvious that MTMR prohibits selfish behavior from<br />
degrading network per<strong>for</strong>mance.<br />
Figure 5 shows that MTMR is more resilient to complex<br />
attack and outper<strong>for</strong>ms AOMDV in presence of both attacks.<br />
Selfish nodes are chosen from nodes not included in traffic<br />
pairs, this clarifies why curves do not reach zero even if all<br />
remaining nodes are selfish. Some path may solely consist of<br />
nodes participating in traffic pairs. There<strong>for</strong>e, curves ending<br />
area depends on network topology and the choice of traffic<br />
pairs.<br />
As stated be<strong>for</strong>e, a type I selfish node reduces number of<br />
discovered paths. There<strong>for</strong>e, as can be seen in figure 5, adding<br />
selfishness type I results in a better PDR in low selfish node<br />
density and a worse PDR in high density scenarios. An<br />
increase in the PDR is due to removing some paths that contain<br />
selfish node type II as well as selfish node type I. The<br />
per<strong>for</strong>mance degradation is caused by selfish nodes type I<br />
removing selfish type II-free paths.<br />
Packet Delivery Ratio considering avoided streams<br />
1<br />
0.9<br />
0.8<br />
0.7<br />
0.6<br />
0.5<br />
0.4<br />
0.3<br />
0.2<br />
0.1<br />
Figure 5 PDR, selfish II & complex attack<br />
MTMR selfish II attack<br />
AOMDV selfish II attack<br />
MTMR complex attack<br />
AOMDV complex attack<br />
MTMR versus AOMDV<br />
0<br />
0 10 20 30 40 50 60<br />
% of selfish nodes<br />
Every security implementation has a cost. The cost <strong>for</strong><br />
detecting and punishing selfishness in addition to keeping<br />
network per<strong>for</strong>mance is higher number of RREP transmissions.<br />
One of the achieved gains is a significant reduction in data loss;<br />
number of generated but not received data packets. Number of<br />
control packet transmissions is shown in figure 6. It can be<br />
seen that MTMR has higher number of RREP transmissions.<br />
Figure 7 compares protocols' data loss in case of complex<br />
attack.<br />
Figure 6 AOMDV & MTMR (RREQ+RREP) transmissions considering<br />
complex attack<br />
No. of (RREQ+RREP) transmissions<br />
Data loss<br />
5000<br />
4500<br />
4000<br />
3500<br />
3000<br />
2500<br />
2000<br />
1500<br />
1000<br />
500<br />
1000<br />
MTMR versus AOMDV<br />
0<br />
0 10 20 30 40 50 60<br />
900<br />
800<br />
700<br />
600<br />
500<br />
400<br />
300<br />
200<br />
100<br />
% of selfish nodes<br />
MTMR<br />
AOMDV<br />
Figure 7 Data loss, protocols are subject to complex attack<br />
MTMR versus AOMDV<br />
MTMR<br />
AOMDV<br />
0<br />
0 10 20 30 40 50 60<br />
% of selfish nodes<br />
Another impact of misbehaving nodes is increasing the<br />
power consumption of benign nodes. In order to investigate<br />
the trade off <strong>for</strong> selfish-aware routing, we compare number of<br />
sent bits <strong>for</strong> specified traffics. Sent bytes consist of control<br />
packets and data retransmissions. IP standard<br />
recommendations are used as a reference <strong>for</strong> data packet size.<br />
This is shown in figure 8. Sent bytes are divided by 100,000<br />
bytes.<br />
It is obvious that MTMR outper<strong>for</strong>ms AOMDV in terms of<br />
sent bytes per traffic. This means reaching the routing security<br />
goals discussed be<strong>for</strong>e does not increase nodes' sent bytes<br />
when network is subject to selfish attacks. But also decreases<br />
transmission power loss per traffic. Moreover, simulation<br />
results demonstrate that in contrast to defenseless protocol,<br />
MTMR sent bytes do not increase when number of selfish<br />
nodes increases. The reason is that our defense scheme<br />
obstructs data loss and control overheads (control packets)<br />
occupy a considerably smaller amount than data payload.<br />
There<strong>for</strong>e, although MTMR has higher number of control<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 13
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
packet transmissions, its lower data loss results in a noticeable<br />
reduction in sent bytes.<br />
same as the data illustrated in table 2. Simulation results<br />
confirm this claim. We avoid repetition due to space limits.<br />
Normalized Sent Bytes<br />
10<br />
9<br />
8<br />
7<br />
6<br />
5<br />
4<br />
3<br />
2<br />
1<br />
Figure 8 Sent bytes considering complex attack<br />
MTMR versus AOMDV<br />
MTMR<br />
AOMDV<br />
0<br />
0 10 20 30 40 50 60<br />
D. Punishment<br />
In this scenario, we use the same network with 10 traffic<br />
streams that are initiated between 10 randomly selected benign<br />
pairs. We also include 10 randomly selected selfish nodes.<br />
Each traffic contains 1000 data packets. Random traffics<br />
having selfish nodes as source and/or destination are added to<br />
the network. Each simulation is repeated 30 times to be<br />
averaging over randomness.<br />
In order to show punishment property of MTMR, we define<br />
the benchmark "Selfish Attempt Success Ratio" as the ratio of<br />
successful data deliveries to the number of tries to send the<br />
packets. This is effectively equal to the ratio of received ACK<br />
packets to the initiated data packets <strong>for</strong> selfish nodes. The<br />
lower the SASR, the lower the chance <strong>for</strong> selfish nodes to have<br />
a successful data connection and there<strong>for</strong>e, the more severe the<br />
punishment. Figure 9 compares SASR in MTMR and AOMDV<br />
protocols. It can be easily concluded that MTMR significantly<br />
punishes selfish nodes.<br />
In a network with selfish nodes, it is desirable to have a<br />
higher PDR <strong>for</strong> benign nodes compared to selfish nodes.<br />
There<strong>for</strong>e, we can consider "Benign to Selfish PDR" as a point<br />
of reference showing punishment of selfish nodes. Figure 10<br />
shows the value of this benchmark in both protocols as<br />
percentage of selfish nodes increases. It can clearly be seen<br />
that MTMR per<strong>for</strong>ms better than AOMDV.<br />
E. Sinkhole and Grey-hole<br />
% of selfish nodes<br />
Noting the definitions, from the perspective of a MTMR<br />
node, a selfish node type II, a sinkhole, a grey-hole and a<br />
wormhole node all represent the same behavior. They <strong>for</strong>ward<br />
routing packets but discard data packets. There<strong>for</strong>e, all these<br />
misbehaviors will face the same reaction by benign nodes.<br />
Hence, simulation results <strong>for</strong> all these cases will be the same.<br />
Namely, they will all be punished according to the same<br />
curve, and sinkhole and grey-hole detection will be about the<br />
Selfish Attempt Success Ratio<br />
Benign to Selfish PDR<br />
1<br />
0.9<br />
0.8<br />
0.7<br />
0.6<br />
0.5<br />
0.4<br />
0.3<br />
0.2<br />
0.1<br />
Figure 9 Selfish nodes Attempt Success Ratio<br />
0<br />
0 2 4 6 8 10 12 14 16 18 20<br />
Figure 10 MTMR versus AOMDV, Benign to Selfish PDR<br />
6<br />
5<br />
4<br />
3<br />
2<br />
1<br />
MTMR<br />
AOMDV<br />
MTMR versus AOMDV<br />
Number of selfish connections<br />
MTMR versus AOMDV<br />
Acknowledgment<br />
This work is partially supported by Cryptographic Chair of<br />
Iran National Science Foundation (INSF) under contract No.<br />
84/5193 and Iran Telecommunication Research Center (ITRC)<br />
under contract No. T/500/20961 in In<strong>for</strong>mation Systems and<br />
Security Lab (ISSL) Electrical Engineering Department of<br />
Sharif University of Technology.<br />
VI. REFERENCES<br />
AOMDV<br />
MTMR<br />
0<br />
0 10 20 30 40 50 60<br />
% of selfish nodes<br />
[1] C. Karlof, D. Wagner, "Secure routing in wireless sensor networks:<br />
attacks and countermeasures," in IEEE International Workshop on<br />
Sensor Network <strong>Protocol</strong>s and Applications, 2003, pp. 113-127.<br />
[2] S. Basagni, M. Conti, S. Giordano and I. Stojmenovic, Mobile <strong>Ad</strong> hoc<br />
Networking. IEEE Press, 2004.<br />
[3] A. Perrig, Y-C Hu, and D. B. Johnson, "Wormhole Protection in<br />
<strong>Wireless</strong> <strong>Ad</strong> Hoc Networks," Dept. of Computer Science, Rice<br />
University, Technical Report TR01-384.<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 14
A <strong>Misbehavior</strong>-<strong>Tolerant</strong> <strong>Multipath</strong> <strong>Routing</strong> <strong>Protocol</strong> <strong>for</strong> <strong>Wireless</strong> <strong>Ad</strong> hoc Networks<br />
[4] M. Khabbazian, H. Mercier and V. Bhargava, "Severity analysis and<br />
countermeasure <strong>for</strong> the wormhole attack in wireless ad hoc networks,"<br />
IEEE Transaction on <strong>Wireless</strong> Communications, vol. 8, pp. 736-745,<br />
2009.<br />
[5] M. Janzamin, M.R. Pakravan and H. Sedghi, "A Game-Theoretic<br />
Approach <strong>for</strong> Power Allocation in Bidirectional Cooperative<br />
Communication," in <strong>Wireless</strong> Communications and Networking<br />
Conference (WCNC), Sydney, Australia, 2010, pp. 1-6.<br />
[6] F. Marias, P. Georgiadis, D. Flitzanis and K. Mandalas, "Cooperation<br />
en<strong>for</strong>cement schemes <strong>for</strong> MANETs: A survey," Journal of <strong>Wireless</strong><br />
communications and mobile computing, vol. 6, p. 319–332, 2006.<br />
[7] S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A simple, cheat-proof, creditbased<br />
system <strong>for</strong> mobile ad-hoc networks," IEEE INFOCOM, vol. 3, no.<br />
30, p. 1987–1997, Mar. 2003.<br />
[8] L. Anderegg, S. Eidenbenz, "<strong>Ad</strong> hoc- VCG: A truthful and cost-efficient<br />
routing protocol <strong>for</strong> mobile ad hoc networks with selfish agents," in<br />
IEEE MOBICOM, Sept. 2003, p. 245–259.<br />
[9] Y. Wang, V. Giruka and M. Singhal, "Truthful multipath routing <strong>for</strong> ad<br />
hoc networks with selfish node ," Journal of parallel and distributed<br />
computing, vol. 68, pp. 778-789, 2008.<br />
[10] P. Michiardi, R. Molva, "Core: a collaborative reputation mechanism to<br />
en<strong>for</strong>ce node cooperation in mobile ad hoc networks," in Proceedings of<br />
the IFIP TC6/TC11 Sixth Joint Working Conference on Communications<br />
and Multimedia Security: <strong>Ad</strong>vanced Communication, September 2002,<br />
pp. 107-121.<br />
[11] M. Rafaei, V. Srivastava and M. Eltoweissy, "A Reputation-based<br />
mechanism <strong>for</strong> isolating selfish nodes in ad hoc networks," in IEEE<br />
MobiQuitous, 2005, pp. 3-11.<br />
[12] N. Jiang, K. A Hua and M. Tantaoui, "Collaboration En<strong>for</strong>cement and<br />
adaptive data redirection in mobile ad hoc networks using only first-hand<br />
experience," in IFIP, 2005, pp. 227-238.<br />
[13] S. Marti , T. J. Giuli , Kevin Lai , Mary Baker, "Mitigating routing<br />
misbehavior in mobile ad hoc network," in 6th annual international<br />
conference on Mobile computing and networking, August 2000, pp. 255-<br />
265.<br />
[14] B. Wang, S. Soltani, J. Shapiro and P. Tan, "Local detection of selfish<br />
routing behavior in ad hoc networks," in Proceedings of 8th international<br />
symposium of parallel architectures, algorithms and networks, 2005.<br />
[15] T. Suzuki, A. Khan and W. Takita, "Proactive cooperation mechanism<br />
against selfish power off <strong>for</strong> mobile ad hoc networks," IEICE<br />
transactions on communications, vol. E90-B, no. 10, pp. 2702-2711, Oct.<br />
2007.<br />
[16] M.K. Marina, S.R. Das, "<strong>Ad</strong> hoc on-demand multipath distance vector<br />
(AOMDV) routing," in International Conference on Network<br />
<strong>Protocol</strong>s(ICNP), 2001, pp. 14-23.<br />
[17] C. E. Perkins,E.M.Royer and S.R. Das, "<strong>Ad</strong> Hoc On-Demand Distance<br />
Vector <strong>Routing</strong>," in IEEEWorkshop on Mobile Computing Systems and<br />
Applications (WMCSA), 1999, pp. 90-100.<br />
[18] D.B. Johnson, D.A. Maltz, "Dynamic source routing in ad hoc wireless<br />
networks," Mobile Computing, pp. 153-181, 1996.<br />
[19] Georgios Parissidis, Vincent Lenders, Martin May, Bernhard Plattner,<br />
"Multi-path routing protocols in wireless mobile ad hoc networks: A<br />
quantitative comparison," in 6th International Conference on Next<br />
Generation Teletraffic and Wired/<strong>Wireless</strong> <strong>Ad</strong>vanced Networking<br />
NEW2AN 2006, May, 2006.<br />
[20] W. R. Stevens, TCP/IP Illustrated: The <strong>Protocol</strong>s. <strong>Ad</strong>dison-Wesley,<br />
1994, vol. 1.<br />
Short Biography with photograph<br />
Hanie Sedghi received her B.Sc. and M.Sc. in Electrical Engineering from Sharif University of Technology in 2007 and 2009<br />
respectively. She is currently a PhD Student in Electrical Engineering Department University of Southern Cali<strong>for</strong>nia. Her<br />
research interests include Network optimization, wireless networks and Learning in networks.<br />
Mohammad Reza Pakravan received his B.Sc. in Electrical Engineering from Tehran University. He received is M.Sc. and<br />
his PhD from university of Ottawa. He is currently Associate professor at Sharif University of Technology. His research<br />
interests are Data Networking <strong>Protocol</strong>s, Optical Communications, Cooperative Communications, Cognitive Radio<br />
Systems, Cross Layer Optimization, <strong>Wireless</strong> <strong>Ad</strong> Hoc and Sensor Networks.<br />
Mohammad Reza Aref received a bachelor's degree in electronics engineering from the University of Tehran, and the<br />
master's and Ph.D. degrees in electrical and communication engineering from Stan<strong>for</strong>d University in 1975, 1976 and 1980,<br />
respectively. His PhD dissertation was on the in<strong>for</strong>mation theory of networks, supervised by Prof. Thomas M. Cover. He<br />
introduced and analyzed deterministic relay networks which is later termed by Aref Networks. He is currently professor in<br />
electrical engineering department, Sharif University of Technology. His research interests are In<strong>for</strong>mation Theory and<br />
Security.<br />
International Journal of Research in <strong>Wireless</strong> Systems (IJRWS), Volume 2, Issue 2, June (2013) 15