Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Sergio Marti,T.J. Giuli, Kevin Lai, and Mary Baker,MobiCom 2000
Introduces two techniques that improve throughput in an ad hoc network in the presence of “misbehaving” nodes.
DSDV is a proactive routing protocol that uses destination sequence numbers to ensure loop-free routing in mobile ad hoc networks. Each node maintains a routing table with destination addresses, next hops, metrics, and sequence numbers. Nodes periodically broadcast their full routing tables, and also broadcast updates immediately after changes to avoid counting to infinity problems. DSDV aims to limit unnecessary route advertisements through a mechanism to dampen fluctuations in routing tables.
This document discusses and compares two routing protocols: distance vector routing and link state routing. Distance vector routing involves each node sharing its routing table only with its neighbors, while link state routing involves each node having knowledge of the entire network topology. The document outlines the working principles, drawbacks like count to infinity, and pros and cons of each approach.
This document provides an example to illustrate how the distance vector routing algorithm works. It shows the vector tables of routers B, D, and C that store the distances to all other routers. It then calculates the routing table for router A based on the distances through neighboring routers B, D, and C, taking the minimum distances. The final routing table for A is (0, 2, 2, 1, 2, 2) with routes going through routers D, C, D, D, D respectively.
This document discusses the YOLO object detection algorithm and its applications in real-time object detection. YOLO frames object detection as a regression problem to predict bounding boxes and class probabilities in one pass. It can process images at 30 FPS. The document compares YOLO versions 1-3 and their improvements in small object detection, resolution, and generalization. It describes implementing YOLO with OpenCV and its use in self-driving cars due to its speed and contextual awareness.
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
This document discusses ad hoc wireless networks. It defines ad hoc networks as infrastructureless wireless networks that use multi-hop radio relaying without centralized administration. Key characteristics include dynamic topology, self-organization, and being self-configuring. Issues discussed include routing challenges from mobility, bandwidth constraints, and frequent path breaks. Transport protocols must support reliable delivery over unstable connections while managing congestion and flow control. Security and energy efficiency are also important concerns to address in ad hoc wireless network design and deployment.
DSDV is a proactive routing protocol that uses destination sequence numbers to ensure loop-free routing in mobile ad hoc networks. Each node maintains a routing table with destination addresses, next hops, metrics, and sequence numbers. Nodes periodically broadcast their full routing tables, and also broadcast updates immediately after changes to avoid counting to infinity problems. DSDV aims to limit unnecessary route advertisements through a mechanism to dampen fluctuations in routing tables.
This document discusses and compares two routing protocols: distance vector routing and link state routing. Distance vector routing involves each node sharing its routing table only with its neighbors, while link state routing involves each node having knowledge of the entire network topology. The document outlines the working principles, drawbacks like count to infinity, and pros and cons of each approach.
This document provides an example to illustrate how the distance vector routing algorithm works. It shows the vector tables of routers B, D, and C that store the distances to all other routers. It then calculates the routing table for router A based on the distances through neighboring routers B, D, and C, taking the minimum distances. The final routing table for A is (0, 2, 2, 1, 2, 2) with routes going through routers D, C, D, D, D respectively.
This document discusses the YOLO object detection algorithm and its applications in real-time object detection. YOLO frames object detection as a regression problem to predict bounding boxes and class probabilities in one pass. It can process images at 30 FPS. The document compares YOLO versions 1-3 and their improvements in small object detection, resolution, and generalization. It describes implementing YOLO with OpenCV and its use in self-driving cars due to its speed and contextual awareness.
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
This document discusses ad hoc wireless networks. It defines ad hoc networks as infrastructureless wireless networks that use multi-hop radio relaying without centralized administration. Key characteristics include dynamic topology, self-organization, and being self-configuring. Issues discussed include routing challenges from mobility, bandwidth constraints, and frequent path breaks. Transport protocols must support reliable delivery over unstable connections while managing congestion and flow control. Security and energy efficiency are also important concerns to address in ad hoc wireless network design and deployment.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
1) The document describes the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive protocol that discovers routes on-demand using a route discovery process.
2) When a node needs to send a packet to an unknown destination, it broadcasts a route request (RREQ) to its neighbors. Neighbors set up reverse paths and rebroadcast the RREQ until it reaches the destination node.
3) The destination or intermediate nodes with a route can send a unicast route reply (RREP) back to the source node using the reverse path. This sets up a forward path from source to destination for data packets.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
Distance vector routing works by having each node maintain a routing table with the minimum distance to reach every other node. Nodes share their routing tables with immediate neighbors periodically or when changes occur, allowing each node to learn optimal routes throughout the network. Each node sends only the minimum distance and next hop information to neighbors, who update their own tables. This sharing of routing information allows all nodes to gradually learn the least-cost routes.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
A routing algorithm determines the best path for data packets to travel between a source and destination on the Internet. This document discusses and compares different routing algorithms used within autonomous systems (ASes) and between ASes. It covers link-state algorithms like OSPF that use flooding to share full topology information, distance-vector algorithms like RIP that share routing tables with neighbors, and BGP which connects different ASes and allows policies to influence path selection.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
The document summarizes key concepts related to network layer addressing, error reporting, and multicasting from Chapter 21. It includes:
1) Address mapping allows mapping between logical and physical addresses either statically or dynamically using protocols like ARP.
2) ICMP handles error reporting and network queries that IP lacks. It includes error messages and query messages.
3) IGMP manages group membership and multicast addressing and routing. It allows hosts to join multicast groups.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
This document provides an overview of mathematical morphology and its applications in image processing. Some key points:
- Mathematical morphology uses concepts from set theory and uses structuring elements to probe and modify binary and grayscale images.
- Basic morphological operations include erosion, dilation, opening, closing, hit-or-miss transformation, thinning, thickening, and skeletonization.
- Erosion shrinks objects and removes small details while dilation expands objects and fills small holes. Opening and closing combine these to smooth contours or fuse breaks.
- Morphological operations have many applications including boundary extraction, region filling, component labeling, convex hulls, pruning, and more. Grayscale images extend these concepts using minimum/maximum
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
4. Analog to digital conversation (1).ppttest22333
This document discusses digital transmission techniques, including analog-to-digital conversion methods like pulse code modulation (PCM) and delta modulation. It explains the key steps in PCM - sampling, quantization, and binary encoding. It also covers important concepts like the Nyquist sampling theorem and quantization error. Delta modulation is introduced as an alternative that transmits only the differences between signal pulses. The document concludes by describing parallel, asynchronous, synchronous, and isochronous transmission modes.
This document provides an overview of routing algorithms. It begins with an introduction to routing and forwarding. It then describes adaptive routing algorithms like centralized, isolation, and distributed algorithms. Non-adaptive algorithms like flooding and random walks are also covered. Common routing protocols like OSPF, BGP, and RIP are listed. Distance vector and link state routing algorithms are explained in detail through examples of how routing tables are created and updated.
DSR is a source routing protocol for wireless ad hoc networks. It uses source routing whereby the source specifies the complete path to the destination in the packet header. Route discovery is done through route request broadcasts, and routes are cached for future use. Route maintenance is done through acknowledgements; if a link breaks, a route error is sent back to the source. Simulation results showed high packet delivery ratios even with high node mobility. DSR performs well for dynamic wireless networks.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
1) The document describes the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive protocol that discovers routes on-demand using a route discovery process.
2) When a node needs to send a packet to an unknown destination, it broadcasts a route request (RREQ) to its neighbors. Neighbors set up reverse paths and rebroadcast the RREQ until it reaches the destination node.
3) The destination or intermediate nodes with a route can send a unicast route reply (RREP) back to the source node using the reverse path. This sets up a forward path from source to destination for data packets.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
Distance vector routing works by having each node maintain a routing table with the minimum distance to reach every other node. Nodes share their routing tables with immediate neighbors periodically or when changes occur, allowing each node to learn optimal routes throughout the network. Each node sends only the minimum distance and next hop information to neighbors, who update their own tables. This sharing of routing information allows all nodes to gradually learn the least-cost routes.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
A routing algorithm determines the best path for data packets to travel between a source and destination on the Internet. This document discusses and compares different routing algorithms used within autonomous systems (ASes) and between ASes. It covers link-state algorithms like OSPF that use flooding to share full topology information, distance-vector algorithms like RIP that share routing tables with neighbors, and BGP which connects different ASes and allows policies to influence path selection.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
The document summarizes key concepts related to network layer addressing, error reporting, and multicasting from Chapter 21. It includes:
1) Address mapping allows mapping between logical and physical addresses either statically or dynamically using protocols like ARP.
2) ICMP handles error reporting and network queries that IP lacks. It includes error messages and query messages.
3) IGMP manages group membership and multicast addressing and routing. It allows hosts to join multicast groups.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
This document provides an overview of mathematical morphology and its applications in image processing. Some key points:
- Mathematical morphology uses concepts from set theory and uses structuring elements to probe and modify binary and grayscale images.
- Basic morphological operations include erosion, dilation, opening, closing, hit-or-miss transformation, thinning, thickening, and skeletonization.
- Erosion shrinks objects and removes small details while dilation expands objects and fills small holes. Opening and closing combine these to smooth contours or fuse breaks.
- Morphological operations have many applications including boundary extraction, region filling, component labeling, convex hulls, pruning, and more. Grayscale images extend these concepts using minimum/maximum
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
4. Analog to digital conversation (1).ppttest22333
This document discusses digital transmission techniques, including analog-to-digital conversion methods like pulse code modulation (PCM) and delta modulation. It explains the key steps in PCM - sampling, quantization, and binary encoding. It also covers important concepts like the Nyquist sampling theorem and quantization error. Delta modulation is introduced as an alternative that transmits only the differences between signal pulses. The document concludes by describing parallel, asynchronous, synchronous, and isochronous transmission modes.
This document provides an overview of routing algorithms. It begins with an introduction to routing and forwarding. It then describes adaptive routing algorithms like centralized, isolation, and distributed algorithms. Non-adaptive algorithms like flooding and random walks are also covered. Common routing protocols like OSPF, BGP, and RIP are listed. Distance vector and link state routing algorithms are explained in detail through examples of how routing tables are created and updated.
DSR is a source routing protocol for wireless ad hoc networks. It uses source routing whereby the source specifies the complete path to the destination in the packet header. Route discovery is done through route request broadcasts, and routes are cached for future use. Route maintenance is done through acknowledgements; if a link breaks, a route error is sent back to the source. Simulation results showed high packet delivery ratios even with high node mobility. DSR performs well for dynamic wireless networks.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
From Birds to Network Nodes
Components in Each Node
Information Flow in Each Node
Information Flow Between Nodes
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this project, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, where by malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
This document summarizes a research paper that proposes and evaluates a cross-layer optimization approach for the Dynamic Source Routing (DSR) protocol and the 802.11 MAC layer in mobile ad hoc networks. The approach tracks signal strengths of neighboring nodes to distinguish between packet losses due to mobility versus congestion. This information is provided to DSR to avoid unnecessary route error and maintenance processes when losses are due to congestion rather than broken links. Simulations evaluate the approach under different static and mobile scenarios and traffic patterns, showing improvements in routing overhead, packet losses and throughput compared to the conventional DSR protocol.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document evaluates the performance of the AODV and DSR routing protocols for variable bit rate (VBR) traffic in mobile ad hoc networks (MANETs) with 150 nodes. It analyzes the protocols based on four metrics: packet received, throughput, routing overhead, and network load. The results of simulations in NS-2 show that AODV outperforms DSR in terms of packet received and throughput, with AODV receiving significantly more packets than DSR and achieving higher throughput. DSR has lower routing overhead but also lower performance for packet delivery.
This document provides a comparative study of the MCDS (Minimal Connected Dominating Set) algorithm and the DSR (Dynamic Source Routing) protocol for packet forwarding in ad hoc networks. It finds that using MCDS to reduce blind broadcasting in DSR can significantly decrease the routing overhead from 74 packet forwardings to 36. The MCDS forms a virtual backbone to determine routes more efficiently than simple flooding in DSR. While this improves performance, applying MCDS has limitations with non-ideal network topologies. Further research on node mobility and multi-hop transmissions could expand the use of MCDS in practical ad hoc networks.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
This document summarizes and compares several congestion-aware routing protocols for mobile ad hoc networks (MANETs). It discusses the Congestion Adaptive Routing Protocol (CRP), which uses bypass routes to avoid congested areas and splits traffic between primary and bypass routes adaptively. It also describes the Efficient Congestion Adaptive Routing Protocol (ECARP), which modifies AODV parameters to improve congestion handling, and the Congestion Aware Routing plus Rate Adaptation (CARA) protocol, which establishes routes around congested areas. Finally, it discusses the Congestion Aware Routing Protocol for Mobile ad hoc networks (CARM), which uses a weighted channel delay metric to measure
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
Wireless sensor network is a type of network which have no communications pattern for communication between nodes, any node can easily join the network and leave the network so attacks are more probable. Gray hole is one of such attacks and it is tough to detect since malicious node switches behavior between normal node and malicious node. For detection and prevention of gray hole attacks our proposed technique is based on Cluster head and RREQ based approach in WSN. In our proposed technique we select a node which has the highest energy as a cluster head and remaining node are marked as work as cluster member. For each node we decide a threshold for sending RREQ if any node generate RREQ more than threshold then we check its RREP threshold value if it’s less than one than cluster head will conclude this node as a malicious node and broadcast its node id so that all other nodes also mark it as malicious node and drop the request arrive from this malicious node and for gray hole detection.
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
This document analyzes the performance of the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks in terms of cache updating. It proposes a distributed cache updating algorithm to proactively disseminate link failure information to nodes with cached routes containing the broken link. Simulation results show that the modified DSR protocol with distributed cache updating has higher packet delivery ratio and throughput, while generating lower normalized routing overhead compared to the standard DSR protocol. The distributed cache updating approach helps remove stale routes from caches faster and improves the performance of the on-demand DSR protocol for highly mobile ad hoc networks.
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODELcscpconf
Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that’s why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified.In this paper, we present the “Mirror Model” that strictly enforces cooperation due to its punishment strategy. Node’s behavior is watched by its neighbors in PON mode, to update the NPF, NPRF values for a threshold time. After the expiry of the threshold time each node
calculates the PFR and broadcasts its neighbors. Similarly all neighbors broadcasted PFR is received and processed by the node to define the ‘G’ and ‘BP’ values. The G value is used to
isolate selfish nodes from the routing paths and BP denotes the amount of packets to be dropped by an honest node against a selfish node in spite of its misbehavior/packet drops. Cooperation within the neighbors, certainly result in subsiding misbehavior of selfish nodes, therein enhancing cooperation of the whole MANET. This model ensures honesty and reliability in
MANET because it does not eliminate a node, but it behaves in the same way as the node behaved. Therefore, it justifies its name, after all mirrors reflects the same. We have implemented the model in “GloMoSim” on top of the DSR protocol, resulting its effectiveness, as compared to the DSR protocol when the network is misconducting for its selfish needs
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
Similar to Mitigating routing misbehavior in mobile ad hoc networks (20)
This document outlines a 4-day Python programming class covering basic Python, advanced Python, web scraping with Python, and building a web application with Python. On the fourth day, students will learn about CRUD operations, databases, and the ORM pattern. They will also learn to build an HTTP server, develop web applications with the Flask framework, access GPIO pins on the Raspberry Pi, and control an LCD display on the Raspberry Pi. As a final project, students will build a simple control center web application for the Raspberry Pi that accesses I/O using Flask and Python.
This document provides information about accessing and parsing web data using Python and BeautifulSoup. It discusses setting up a development environment on a Raspberry Pi with Python, Flask, and BeautifulSoup installed. It covers retrieving HTML data using urllib and parsing it using BeautifulSoup to extract tags and attributes. Common issues like HTTP errors and missing tags are addressed. Exercises demonstrate getting title data from a URL and extracting tags by class attribute.
This document outlines a 4-day Python Programming class taught by Paul Yang in 2016. The agenda covers basic Python on day 1, advanced Python on day 2, web scraping with Python on day 3, and web application development with Python on day 4. Day 1 of the class focuses on introducing Python, setting up the development environment, and covering basic Python concepts like data types, control flow, functions, and I/O. The class is intended to help students understand the history and features of Python, install Anaconda for package management, and get familiar with common data types, functions, and programming constructs in Python.
The document discusses various Python programming concepts including generator functions, list comprehensions, list processing features, and performance analysis using tools like timeit and memory_profiler. It provides examples of generator functions that produce sequences iteratively using yield instead of returning a list, and explores list comprehensions as a more concise way to create lists from expressions compared to traditional for loops. The document also demonstrates measuring the time and memory usage of functions to analyze performance differences between approaches.
The document provides an agenda for a hands-on training on RHEL5 Xen virtualization technology. It discusses key concepts of virtualization including types of Xen virtualization, performance, and supporting status in RHEL5. Labs cover installing guest systems via paravirtualization and full virtualization, configuring networks, and known issues workarounds. The training aims to introduce virtualization technology, the RHEL5 implementation, and provide hands-on experience through guided labs.
This document provides an overview and instructions for validating the Intel AT-d platform on Intel vPro systems. It describes the hardware and firmware prerequisites, how to enable AT-d in the BIOS and Management Engine, and how to perform validation tests. The validation process includes checking AT-d hardware and software straps, enabling AT-d, and verifying BIOS compliance. It also outlines the steps for assigning an administrator, managing users, and configuring devices for encryption with AT-d.
HP Performance Tracking is a set of tools used by HP to measure the performance of PCs against HP set limits. The tools are based on the Microsoft Windows Assessment Kit and concentrate on power up/down measurements. HP Performance Tracking includes a customized HP client, a SharePoint site for uploading results, a SQL database to store results, and a viewer to view and analyze the results. The client collects additional HP-specific data and measures performance against HP limits to identify failures. Results are uploaded to SharePoint and transferred nightly to the SQL database for analysis in the viewer.
The custom HP Perftrack client allows HP to:
- Include custom color coded HP performance limits to control when a service incident should be written.
- Zip up results for consistent reporting instead of screen captures, and capture additional system information.
- Add additional tests beyond what the Microsoft Assessment Kit includes, such as first logon command time.
- HP Perftrack uses the same underlying tests as the ADK but with a smaller footprint and customized tests and limits.
The document provides instructions for analyzing performance issues using the Windows Assessment and Deployment Kit (ADK). It outlines the process for setting up and running ADK tests, managing results, and debugging issues. Key steps include installing the Windows Assessment Console (WAC) to view XML results files and launch the Windows Performance Analyzer (WPA) to analyze detail trace files to identify causes of performance problems like prolonged fast boot shutdown times.
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...Paul Yang
1) The document describes ORION, a peer-to-peer file sharing system designed for mobile ad hoc networks. ORION uses an overlay network constructed on-demand to efficiently route search queries and file transfers.
2) ORION maintains routing tables to track responses to queries and paths for file transfers. It uses link layer feedback to detect and route around failures during transfers.
3) Simulation results show ORION significantly outperforms off-the-shelf P2P systems in search accuracy and reliability of file transfers in mobile ad hoc networks.
A brief study on bottlenecks to Intel vs. Acer v0.1.pdfPaul Yang
This document discusses potential bottlenecks in the relationship between Intel and Acer from both companies' perspectives. It outlines identifying problems, determining causes, potential options for mitigating issues, verifying effectiveness of options, and developing an action plan. Specifically, it examines messy distribution channels, endless price bargaining, and declining support from Intel partners. More data is needed to fully understand organizational changes, strategies, requirements, and value propositions from both sides.
This document discusses opportunities for Arm in data center and edge computing infrastructure. It outlines Arm's growing footprint in servers through partners like AWS, Ampere, Marvell, and provides an overview of the Neoverse roadmap. It also discusses how Arm can address markets like smartNICs and uCPE through integrated solutions with better performance and cost than x86.
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfPaul Yang
The purpose of this technical talk with the demo is to show ODMs, OEMs, and ISVs how to leverage SystemReady Lab, showcase the use-case based on the virtualization platform for the edge, and deploy open-source tools that set up ODMs to develop their Arm platforms.
Routing Security and Authentication Mechanism for Mobile Ad Hoc NetworksPaul Yang
The document proposes a two-tier authentication mechanism for routing security in mobile ad hoc networks (MANETs). The first tier, called cluster authentication, uses message authentication codes and hash functions to verify if a node belongs to the same group and prevent external attacks. The second tier, called individual authentication, applies secret sharing to authenticate the identity of specific nodes and prevent internal attacks. Together, the two-tier mechanism provides security against both external and internal threats with reasonable computational complexity and bandwidth usage for MANETs.
English teaching in icebreaker and grammar analysisPaul Yang
The document discusses grammar analysis and ice breaker series. It provides an overview of the ice breaker series which aims to help students practice spoken English through scenario-based conversations. It also compares the present simple tense and present perfect tense through examples and explanations of when to use each. The differences between the past simple tense, past progressive tense, and past perfect tense are also outlined through examples to help understand them logically rather than through memorization.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Mitigating routing misbehavior in mobile ad hoc networks
1. 1
Mitigating Routing
Misbehavior in Mobile
Ad Hoc Networks
Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker
Department of Computer Science, Stanford University
IEEE Communications Magazine October 2002
報告者 : 楊曜年
指導教授 : 劉如生 博
士
2. OverviewOverview
“Mitigating Routing Misbehavior in Mobile Ad
Hoc Networks”, Sergio Marti,T.J. Giuli, Kevin
Lai, and Mary Baker,MobiCom 2000
Introduces two techniques that improve
throughput in an ad hoc network in the presence
of “misbehaving” nodes.
3. OutlineOutline
Introduction
Assumptions
Dynamic Source Routing (DSR)
-Watchdog
-Pathrater
Methodology
Movement and Communication Patterns
Misbehaving Nodes
Metrics
Simulation Results
Related Work
Future Work and Conclusion
4. IntroductionIntroduction
There will be a tremendous growth over the next
decade in the use of wireless communication.
Advantage:Advantage: ability to transmit data among users
in a common area while remaining mobile.
Disadvantage:Disadvantage: the distance between participants
is limited by a range of transmitters or their
proximity to wireless access points
Solution:Solution: Ad hoc wireless networks mitigate this
problem by allowing out of range nodes to route
data through intermediate nodes.
5. Ad hoc networks are ideal in situations where
installing an infrastructure is not possible
because the infrastructure is too expensive or
too vulnerable, the network is too transient or the
infrastructure was destroyed.
e.g. battlefields, military applications , emergency and disaster situation
IntroductionIntroduction
6. Node may misbehave by agreeing to forward
packets and then failing to do so, because it is:
Overloaded nodeOverloaded node – lacks the CPU cycles, buffer
space or available network bandwidth to forward
packets.
Selfish nodeSelfish node – unwilling to spend battery life, CPU
cycles, or available network bandwidth to forward
packets not of direct interest to it.
Malicious nodeMalicious node – launches a denial of service attack
by dropping packets.
Broken nodesBroken nodes – might have a software fault that
prevents it from forwarding packets.
IntroductionIntroduction
7. To mitigate the effects of routing misbehavior, it
is introduced two extensions to the Dynamic
Source Routing algorithm (DSR)
Watchdog:Watchdog: identifies misbehaving nodes.
Pathrater:Pathrater: avoids routing packets through these
nodes.
The two techniques increase throughput by 17%
in the presence of up to 40% misbehaving
nodes.
During extreme mobility, they can increase
network throughput by 27%.
IntroductionIntroduction
8. Bidirectional communication symmetry on every
link between nodes.
Watchdog mechanism relies on bidirectional links.Watchdog mechanism relies on bidirectional links.
Wireless interface that support promiscuous
mode operation.
Promiscuous mode means that if a node A is
within a range of a node B, it can overhear
communications to and from B even if those
communications do not directly involve A.
Useful for improving routing protocol performance.Useful for improving routing protocol performance.
AssumptionsAssumptions
9. DSR is an on-demand, source routing protocol.
Route paths are discovers at the time a source send aRoute paths are discovers at the time a source send a
packet to a destination for which the source has nopacket to a destination for which the source has no
path.path.
DSR is divided into two main functions:
Route discoveryRoute discovery
Route maintenanceRoute maintenance
Dynamic Source RoutingDynamic Source Routing
(DSR)(DSR)
10. Route Discovery:Route Discovery:
Figure 1 – Example of a route request
a. Node S sends out a ROUTE REQUEST packet to find a path to node D
11. b. The ROUTE REQUEST is forwarded throughout the network, each
node adding its address to the packet
Route Discovery:Route Discovery:
Figure 1 – Example of a route request
12. c. D sends back a ROUTE REPLY to S using the path contained in one
of the ROUTE REQUEST packet that reached it
Route Discovery:Route Discovery:
Figure 1 – Example of a route request
13. Route Maintenance:Route Maintenance:
Handles link breaks – link breaks occurs when two
nodes on a path are no longer in transmission range.
If an intermediate node detects a link break when
forwarding a packet to the next node in the route path,
It sends back a message to the source notifying it of that
link break.
The source must try another path or do a route discovery
if it does not have another path.
14. WatchdogWatchdog
Identifies misbehaving nodes
Maintains a buffer of transmitted packets
Monitors next hop node’s transmission
Increments a failure tally for the nodes
AS DCB
16. WatchdogWatchdog
Packet Radio Network Schemes ---passive
acknowledgement
B C
E F
J
G
E tries to transmit
to B but fails
F and J hear
transmission
and will forward
F sends first
J removes packet
from its queue
Route from
E to C
17. Advantage:Advantage: it can detect misbehavior at the
forwarding level and not just the link level.
Weakness:Weakness: it might not detect a misbehaving
node in the presence of:
Ambiguous collision
Receiver collision
Limited transmission power
False misbehavior
Collusion
Partial dropping
WatchdogWatchdog
18. WatchdogWatchdog
Ambiguous collision:Ambiguous collision:
Figure 3 – Illustrate a packet collusion can occur at A while it is listening for B to
forward on a packet.
Receiver collision:Receiver collision:
Figure 4 – Illustrate node A can only tell whether B sends the packet to C,
but it cannot tell if C receives it.
19. WatchdogWatchdog
Limited transmission:Limited transmission:
A node could limit its transmission power such that the signal is strong
enough to be overheard by the previous node but too weak to be
received by the true recipient.
False Misbehavior:False Misbehavior:
A malicious node could attempt to partition the network by claiming that
some node following it in the path are misbehaving.
Collusion:Collusion:
Multiple nodes in collusion can amount a more sophisticated attack.
Partial dropping:Partial dropping:
A node can circumvent the watchdog b dropping packets at a lower rate
than the watchdog’s configured minimum misbehavior threshold
20. WatchdogWatchdog
For the watchdog to work properly, it must know
where a packet should be in two hops.
The watchdog has this information because DSR
is a source routing protocol.
If the watchdog does not have this information,
then a malicious or broken node could broadcast
the packet to a non-existent node and the
watchdog would have no way of knowing.
Because of this limitation, watchdog work best on
top of a source routing protocol.
21. PathraterPathrater
Dynamic Source Routing Extensions
The pathrater, run by each node in the network,
combines knowledge of misbehaving nodes with
link reliability data to pick the route most likely to
be reliable.
It calculates a path metric by averaging the node
ratings in the path. We choose this metric
because it gives a comparison of the overall
reliability of different paths
22. PathraterPathrater
Dynamic Source Routing Extensions
Avoids routing packets through malicious nodes
Each node maintains a rating for every other node
A node is assigned as a “neutral” rating of 0.5
The rating of nodes on all actively used path
increase by 0.01 at periodic intervals of 200 ms
The rating of nodes decrease 0.05 when a link
break is detected
High negative numbers are assigned to nodes
suspected of misbehaving nodes by Watchdog
23. PathraterPathrater
Dynamic Source Routing Extensions
Based on Pathrater on Source
A2
S D
C2B2
A1 C1B1Pathrater
built in
1. Route Discovery
0.5 ---initial
0.01+0.5---200ms
0.01+0.5.01---200ms
0.01+0.5.02---200ms
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
0.01+0.502---200ms
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
-0.01+0.502---200ms
0.5 ---initial
-100 by waychdog---200ms
0.5 ---initial
0.01+0.5---200ms
-0.01+0.501---200ms
-0.01+0.500---200ms
S->A1->B1->C1->D
S->A2->B2->C2->D
S->A2->B1->C1->D
Route Cache
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
0.01+0.502---200ms
25. PathraterPathrater
Dynamic Source Routing Extensions
It calculates a path metric by averaging the node
rating in the path
If there are multiple paths, the node chooses the
path with the highest metric
It increases the throughput
It gives a comparison of the overall reliability of
different paths
It increases the ratio of overhead transmissions to
data transmission
26. MethodologyMethodology
OverviewOverview
Assumptions
– Bidirectional communication
– Wireless interfaces that support promiscuous mode
operation
Setup
– 50 nodes in various states of mobility
– Created 4 different extension scenarios (WD, PR,
SRR)
– Varied misbehaving nodes 0% to 40%
27. MethodologyMethodology
SimulatorSimulator
Version of Berkeley’s Network Simulator.
Includes wireless extensions made by the CMU
Monarch project.
Visualization tool from CMU called ad-hockey.
To view the results of the simulations and detect overall
trends in the network.
Simulations take place in a 670x670 meter flat
space filled with a scattering of 50 wireless nodes.
28. MethodologyMethodology
Misbehaving Nodes
Of the 50 nodes in the simulated network, some
variable percentage of the nodes misbehave.
In this simulation a misbehaving node is one that
agrees to participate in forwarding packets but then
indiscriminately drops all data packets that are routed
through it.
The percentage of misbehaving nodes in this
network vary from 0% to 40% in 5% increments.
29. MethodologyMethodology
Metrics
The following three metrics are used:
Throughput:Throughput: % of sent data packets actually received in
the intended destinations.
OverheadOverhead: ratio routing-related transmissions to data
transmissions in a simulation.
Effects of watchdogEffects of watchdog false positivefalse positive on networkon network
throughputthroughput: The impact when watchdog mistakes a
node as misbehaving
30. Simulation ResultsSimulation Results
The focus is on three metrics evaluation
Network throughputNetwork throughput
Routing overheadRouting overhead
Effects of false positives on throughputEffects of false positives on throughput
The utility of various combinations of the
extensions are tested:
Watchdog (WD)Watchdog (WD)
Pathrater (PR)Pathrater (PR)
Send (extra) route request (SRR)Send (extra) route request (SRR)
SRR extension in used to find new paths when all
known paths include a suspected misbehaving node.
31. Network ThroughputNetwork Throughput
Network ThroughputNetwork Throughput
Everything enabled
Watchdog and pathrater enabled
Only pathrater enabled
Everything disabled
Figure 5 shows the total network throughput,
calculated as the fraction of data packets generated
that are received, versus the fraction of misbehaving
nodes in the network for the combinations of
extensions.
34. Network ThroughputNetwork Throughput
As expected, the simulations with all three extensions
active perform the best by a considerable margin as
misbehaving nodes are added to the network.
35. OverheadOverhead
Routing OverheadRouting Overhead
Everything on
Pathrater and watchdog on
Only watchdog on
Everything off
Figure 6 shows the amount of overhead incurred
(causes) by activating the different routing
extensions. It shows routing overhead as a ratio of
routing packet transmissions to data packet
transmissions. This ratio is plotted against the
fraction of misbehaving nodes.
39. Effects on False DetectionEffects on False Detection
Effects on False DetectionEffects on False Detection
Compare simulations of the regular watchdog with a
watchdog that does not report false positives
Figure 7 shows the network throughput lost by the
watchdog incorrectly reporting well-behaved nodes.
These results show that throughput is not
appreciably affected by false positives and that they
may even have beneficial side effects.
40. Effects on False DetectionEffects on False Detection
Figure 7 (a) 0 second pause time
41. Effects on False DetectionEffects on False Detection
Figure 7 (b) 60 second pause time
42. Effects on False DetectionEffects on False Detection
Table 3 shows the average value of false positives
reported by the simulation ran for each pause time
and misbehaving node percentage.
More false positives are reported in the 0 seconds
pause time simulations as compared to the 60
seconds pause time simulations.
43. No significant related work before publication date in
2000.
DSR, AODV, TORA, DSDV, STAR only detect if the
receiver’s network interface is accepting packets.
Some recent related work:
– T. GoffNael, B. Abu-Ghazaleh, D. S. Phatak, and R. Kahvecioglu,
"Preemptive Routing in Ad-Hoc Networks," presented at Seventh annual
international conference on Mobile computing and networking, 2001.
– Y.-C. Hu, A. Perrig, and D. B. Johnson, "Adrianne: A Secure On-Demand
Routing Protocol," presented at Eight Annual International Conference on
Mobile Computing and Networking, Atlanta, GA,2002.
– B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand
Secure Routing Protocol Resilient to Byzantine Failures,"presented at
ACM Workshop on Wireless Security, Atlanta, GA,2002.
Related WorkRelated Work
44. To conduct a more rigorous tests of the watchdog
and pathrater parameters to determine optimal
values to increase throughput in different situations.
Rating increment and decrement amounts
Rate incrementing interval
Delay between sending out route requests to decrease
the overhead caused by this feature
Next goal is to analyze how the routing extensions
perform with TCP flows common to most network
applications.
Evaluate the watchdog and pathrater considering
latency in addition to throughput.
Future WorkFuture Work
45. Ad hoc networks are vulnerable to nodes that
misbehave when routing packets
Simulation evaluates that the 2 techniques
– increases throughput by 17% in network with
moderate mobility, while increase ratio of overhead
to data transmission from 9% to 17%
– increases throughput by 27% in network with
extreme mobility, while increase ratio of overhead
to data transmission from 12% to 24%
ConclusionConclusion
Editor's Notes
Figure 1 illustrates route discovery. Node S (the source) wishes to communicate with node D (the destination) but does not know any paths to D. S initiates a
route discovery by broadcasting a route request packet to its neighbors that contains the destination address D.
The neighbors in turn append their own addresses to the route request packet and rebroadcast it. This process continues
until a route request packet reaches D. D must now send back a route reply packet to inform S of the discovered route.
Since the route request packet that reaches D contains a path from S to D, D may choose to use the reverse path to
send back the reply (bidirectional links are required here) or to initiate a new route discovery back to S. Since there
can be many routes from a source to a destination, a source may receive multiple route replies from a destination. DSR
caches these routes in a route cache for future use.
*Source Route
**Route Cache
***Route Discovery
****Target and Initiator
*****Route Reply
******( Initiator Address and Request ID )
Source wanna send packet to Destination
a.
Figure 2 illustrates how the watchdog works. Suppose there exists a path from node S to D through intermediate nodes A, B,
and C. Node A cannot transmit all the way to node C, but it can listen in on node B's traffic. Thus, when A transmits a
packet for B to forward to C, A can often tell if B transmits the packet. If encryption is not performed separately for
each link, which can be expensive, then A can also tell (know) if B has tampered with the payload or the header.
many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission
of lost or corrupted packets
For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known
as a passive acknowledgement [11].
many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission
of lost or corrupted packets
For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known
as a passive acknowledgement [11].
Half duplex operation: transmit packet, go into receive mode, receive ack, receive next packet, go into transmit mode, repeat
Original sender hears forwarding transmission from next hop node in the route:Power control: transmit with enough power to be heard at D as well as F
In addition, existing transport or application level replies or acknowledgements
from the original destination could also be used as an acknowledgement that the route (or that
hop of the route) is still working. As a last resort, a bit in the packet header could be included to allow a
host transmitting a packet to request an explicit acknowledgement from the next-hop receiver. If no other
acknowledgement signal has been received in some time from the next hop on some route, the host could
use this bit to inexpensively probe the status of this hop on the route.
many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission
of lost or corrupted packets
For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known
as a passive acknowledgement [11].
Half duplex operation: transmit packet, go into receive mode, receive ack, receive next packet, go into transmit mode, repeat
Original sender hears forwarding transmission from next hop node in the route:Power control: transmit with enough power to be heard at D as well as F
In addition, existing transport or application level replies or acknowledgements
from the original destination could also be used as an acknowledgement that the route (or that
hop of the route) is still working. As a last resort, a bit in the packet header could be included to allow a
host transmitting a packet to request an explicit acknowledgement from the next-hop receiver. If no other
acknowledgement signal has been received in some time from the next hop on some route, the host could
use this bit to inexpensively probe the status of this hop on the route.
The ambiguous collision problem prevents A from overhearing transmissions from B.
As Figure 3 illustrates, a packet collision can occur at A while it is listening for B to forward on a packet.
A does not know if the collision was caused by B forwarding on a packet as it should or if B never forwarded
the packet and the collision was caused by other nodes in A's neighborhood.
Because of this uncertainty, A should not immediately accuse B of misbehaving, but should instead continue to watch B over a period of time. If A repeatedly fails to detect B forwarding on packets, then A can assume that B is misbehaving.
Another problem can occur when nodes falsely report other nodes as misbehaving. A malicious node could attempt to
partition the network by claiming that some nodes following it in the path are misbehaving.
For instance, node A could report that node B is not forwarding packets when in fact it is. This will cause S to mark B as misbehaving when A is
the culprit. This behavior, however, will be detected. Since A is passing messages on to B (as verified by S), then any acknowledgements from
D to S will go through A to S, and S will wonder why it receives replies from D when supposedly B dropped packets in the forward direction.
In addition, if A drops acknowledgements to hide them from S, then node B will detect this misbehavior and will report it to D
Another problem is that a misbehaving node that can control its transmission power can circumvent the watchdog. A node could limit its transmission power such that the signal
is strong enough to be overheard by the previous node but too weak to be received by the true recipient. This would require that the misbehaving node know the transmission
power required to reach each of its neighboring nodes. Only a node with malicious intent would behave in this manner selfish nodes have nothing to gain since battery power is
wasted and overloaded nodes would not relieve any congestion by doing this.
The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to
pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the
network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives
a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm
when no reliability information has been collected, as explained below.
If there are multiple paths to the same destination, we choose the path with the highest metric.
Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since
the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source
routing protocol.The pathrater assigns ratings to nodes according to the following algorithm.
Pathrather know status of every node through route discovery
2. The Pathrather assigns it a neutral rating of 0.5
3. A node always rates itself with a 1.0
4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
5.
When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5.
A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected
misbehaving nodes), the pathrater picks the shortest length path.
The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
An actively used path is one on which the node has sent a packet within the previous rate increment interval.
The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link
break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0.
The pathrater does not modify the ratings of nodes that are not currently in active use.
We assign a special highly negative value,
The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to
pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the
network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives
a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm
when no reliability information has been collected, as explained below.
If there are multiple paths to the same destination, we choose the path with the highest metric.
Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since
the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source
routing protocol.The pathrater assigns ratings to nodes according to the following algorithm.
Pathrather know status of every node through route discovery
2. The Pathrather assigns it a neutral rating of 0.5
3. A node always rates itself with a 1.0
4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
5.
When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5.
A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected
misbehaving nodes), the pathrater picks the shortest length path.
The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
An actively used path is one on which the node has sent a packet within the previous rate increment interval.
The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link
break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0.
The pathrater does not modify the ratings of nodes that are not currently in active use.
We assign a special highly negative value,
The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to
pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the
network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives
a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm
when no reliability information has been collected, as explained below.
If there are multiple paths to the same destination, we choose the path with the highest metric.
Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since
the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source
routing protocol.The pathrater assigns ratings to nodes according to the following algorithm.
Pathrather know status of every node through route discovery
2. The Pathrather assigns it a neutral rating of 0.5
3. A node always rates itself with a 1.0
4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
5.
When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5.
A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected
misbehaving nodes), the pathrater picks the shortest length path.
The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
An actively used path is one on which the node has sent a packet within the previous rate increment interval.
The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link
break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0.
The pathrater does not modify the ratings of nodes that are not currently in active use.
We assign a special highly negative value,
The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to
pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the
network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives
a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm
when no reliability information has been collected, as explained below.
If there are multiple paths to the same destination, we choose the path with the highest metric.
Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since
the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source
routing protocol.The pathrater assigns ratings to nodes according to the following algorithm.
Pathrather know status of every node through route discovery
2. The Pathrather assigns it a neutral rating of 0.5
3. A node always rates itself with a 1.0
4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
5.
When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5.
A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected
misbehaving nodes), the pathrater picks the shortest length path.
The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
An actively used path is one on which the node has sent a packet within the previous rate increment interval.
The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link
break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0.
The pathrater does not modify the ratings of nodes that are not currently in active use.
We assign a special highly negative value,
The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to
pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the
network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives
a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm
when no reliability information has been collected, as explained below.
If there are multiple paths to the same destination, we choose the path with the highest metric.
Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since
the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source
routing protocol.The pathrater assigns ratings to nodes according to the following algorithm.
Pathrather know status of every node through route discovery
2. The Pathrather assigns it a neutral rating of 0.5
3. A node always rates itself with a 1.0
4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
5.
When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5.
A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected
misbehaving nodes), the pathrater picks the shortest length path.
The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms.
An actively used path is one on which the node has sent a packet within the previous rate increment interval.
The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link
break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0.
The pathrater does not modify the ratings of nodes that are not currently in active use.
We assign a special highly negative value,
• Assumptions
– Bidirectional communication
– Wireless interfaces that support promiscuous mode operation
• Setup
– 50 nodes in various states of mobility
– Created 4 different extension scenarios (WD, PR, SRR)
– Varied misbehaving nodes 0% to 40%
• Assumptions
– Bidirectional communication
– Wireless interfaces that support promiscuous mode operation
• Setup
– 50 nodes in various states of mobility
– Created 4 different extension scenarios (WD, PR, SRR)
– Varied misbehaving nodes 0% to 40%
While a network with 40% misbehaving nodes may seem unrealistic, it is interesting to study the behavior of the algorithms in a more hostile environment than we hope to encounter in a real life.
• Evaluation done on three metrics:
– Throughput: % of sent data actually
received by the intended destinations
– Overhead: Ratio of routing-related
transmission to data transmissions
– Watchdog False Positives: The impact
when watchdog mistakes a node as
misbehaving
• Best performance when all three extensions were active
• Pathrater isolated in one test
• Pathrater alone does not affect
performance
• Best performance when all three extensions were active
• Pathrater isolated in one test
• Pathrater alone does not affect
performance
• Increased overhead
• Watchdog isolated in one simulation
• Watchdog alone adds a little overhead
c
• Demonstrated how throughput is effected with the reporting of False
Positives
• Throughput does decrease but could result in beneficial side effects:
– Helps determine unreliable nodes
– Ambiguous collisions may help increase throughput
– Nodes maintain a fresher route cache
c
c
c
Note that the simulations in this paper uses CBR data sources with no reliability requirements.