Share This Article:

Self Umpiring System for Security in Wireless Mobile Ad Hoc Network

Abstract Full-Text HTML Download Download as PDF (Size:248KB) PP. 264-266
DOI: 10.4236/wsn.2010.23036    4,620 Downloads   8,457 Views   Citations

ABSTRACT

A wireless mobile ad hoc network (MANET) is a self-created self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or centralized administrator. In this paper we propose a solution of self-umpiring system that provides security for routing and data forwarding operations. In our system each node in the path from source to destination has dual roles to perform: packet forwarding and umpiring. In the umpiring role, each node in the path closely monitors the behavior of its succeeding node and if any misbehavior is noticed immediately flags off the guilty node. The umpiring system proposed is sufficiently general and can be applied to any networking protocol. For demonstration, we have implemented the self-umpiring system by modifying the popular AODV protocol. Simulation studies show that the proposed system increases throughput by 166.9% with an increase in communication overhead of 13.3% as compared to plain AODV, when 40% of the nodes are malicious and are roaming with a mobility of 20 m/s.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

A. Kathirvel and R. Srinivasan, "Self Umpiring System for Security in Wireless Mobile Ad Hoc Network," Wireless Sensor Network, Vol. 2 No. 3, 2010, pp. 264-266. doi: 10.4236/wsn.2010.23036.

References

[1] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, 6-11 August, 2000.
[2] H. Yang, J. Shu, X. Meng and S. Lu, “SCAN: Self-organized network-layer security in Mobile ad hoc networks,” IEEE Journals on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
[3] 3. Scalable Networks Technologies: QualNet simulator 4.5, http://www.scalable-networks.com/
[4] IEEE 802.11g. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, August, 1999.
[5] M. A. Azer, S. M. El-Kassas, and M. S. El-Soudani, “Certification and revocation schemes in ad hoc networks survey and challenges,” Proceeding of IEEE International Conference on Systems and Networks Communications, 2007.
[6] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET,” Proceeding of International Conference on Network Protocols, pp. 251–260, 2001.
[7] N. Nasser and Y. Chen, “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks,” Proceeding of International Conference on Communications, pp. 1154–1159, 2007.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.