SlideShare a Scribd company logo
1
Mitigating Routing
Misbehavior in Mobile
Ad Hoc Networks
Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker
Department of Computer Science, Stanford University
IEEE Communications Magazine October 2002
報告者 : 楊曜年
指導教授 : 劉如生 博
士
OverviewOverview
 “Mitigating Routing Misbehavior in Mobile Ad
Hoc Networks”, Sergio Marti,T.J. Giuli, Kevin
Lai, and Mary Baker,MobiCom 2000
 Introduces two techniques that improve
throughput in an ad hoc network in the presence
of “misbehaving” nodes.
OutlineOutline
 Introduction
 Assumptions
 Dynamic Source Routing (DSR)
-Watchdog
-Pathrater
 Methodology
 Movement and Communication Patterns
 Misbehaving Nodes
 Metrics
 Simulation Results
 Related Work
 Future Work and Conclusion
IntroductionIntroduction
 There will be a tremendous growth over the next
decade in the use of wireless communication.
 Advantage:Advantage: ability to transmit data among users
in a common area while remaining mobile.
 Disadvantage:Disadvantage: the distance between participants
is limited by a range of transmitters or their
proximity to wireless access points
 Solution:Solution: Ad hoc wireless networks mitigate this
problem by allowing out of range nodes to route
data through intermediate nodes.
 Ad hoc networks are ideal in situations where
installing an infrastructure is not possible
because the infrastructure is too expensive or
too vulnerable, the network is too transient or the
infrastructure was destroyed.
e.g. battlefields, military applications , emergency and disaster situation
IntroductionIntroduction
 Node may misbehave by agreeing to forward
packets and then failing to do so, because it is:
 Overloaded nodeOverloaded node – lacks the CPU cycles, buffer
space or available network bandwidth to forward
packets.
 Selfish nodeSelfish node – unwilling to spend battery life, CPU
cycles, or available network bandwidth to forward
packets not of direct interest to it.
 Malicious nodeMalicious node – launches a denial of service attack
by dropping packets.
 Broken nodesBroken nodes – might have a software fault that
prevents it from forwarding packets.
IntroductionIntroduction
 To mitigate the effects of routing misbehavior, it
is introduced two extensions to the Dynamic
Source Routing algorithm (DSR)
 Watchdog:Watchdog: identifies misbehaving nodes.
 Pathrater:Pathrater: avoids routing packets through these
nodes.
 The two techniques increase throughput by 17%
in the presence of up to 40% misbehaving
nodes.
 During extreme mobility, they can increase
network throughput by 27%.
IntroductionIntroduction
 Bidirectional communication symmetry on every
link between nodes.
 Watchdog mechanism relies on bidirectional links.Watchdog mechanism relies on bidirectional links.
 Wireless interface that support promiscuous
mode operation.
 Promiscuous mode means that if a node A is
within a range of a node B, it can overhear
communications to and from B even if those
communications do not directly involve A.
 Useful for improving routing protocol performance.Useful for improving routing protocol performance.
AssumptionsAssumptions
 DSR is an on-demand, source routing protocol.
 Route paths are discovers at the time a source send aRoute paths are discovers at the time a source send a
packet to a destination for which the source has nopacket to a destination for which the source has no
path.path.
 DSR is divided into two main functions:
 Route discoveryRoute discovery
 Route maintenanceRoute maintenance
Dynamic Source RoutingDynamic Source Routing
(DSR)(DSR)
 Route Discovery:Route Discovery:
Figure 1 – Example of a route request
a. Node S sends out a ROUTE REQUEST packet to find a path to node D
b. The ROUTE REQUEST is forwarded throughout the network, each
node adding its address to the packet
 Route Discovery:Route Discovery:
Figure 1 – Example of a route request
c. D sends back a ROUTE REPLY to S using the path contained in one
of the ROUTE REQUEST packet that reached it
 Route Discovery:Route Discovery:
Figure 1 – Example of a route request
 Route Maintenance:Route Maintenance:
 Handles link breaks – link breaks occurs when two
nodes on a path are no longer in transmission range.
 If an intermediate node detects a link break when
forwarding a packet to the next node in the route path,
 It sends back a message to the source notifying it of that
link break.
 The source must try another path or do a route discovery
if it does not have another path.
WatchdogWatchdog
 Identifies misbehaving nodes
 Maintains a buffer of transmitted packets
 Monitors next hop node’s transmission
 Increments a failure tally for the nodes
AS DCB
WatchdogWatchdog
 passive acknowledgement
A CB
WatchdogWatchdog
 Packet Radio Network Schemes ---passive
acknowledgement
B C
E F
J
G
E tries to transmit
to B but fails
F and J hear
transmission
and will forward
F sends first
J removes packet
from its queue
Route from
E to C
 Advantage:Advantage: it can detect misbehavior at the
forwarding level and not just the link level.
 Weakness:Weakness: it might not detect a misbehaving
node in the presence of:
 Ambiguous collision
 Receiver collision
 Limited transmission power
 False misbehavior
 Collusion
 Partial dropping
WatchdogWatchdog
WatchdogWatchdog
 Ambiguous collision:Ambiguous collision:
Figure 3 – Illustrate a packet collusion can occur at A while it is listening for B to
forward on a packet.
 Receiver collision:Receiver collision:
Figure 4 – Illustrate node A can only tell whether B sends the packet to C,
but it cannot tell if C receives it.
WatchdogWatchdog
 Limited transmission:Limited transmission:
A node could limit its transmission power such that the signal is strong
enough to be overheard by the previous node but too weak to be
received by the true recipient.
 False Misbehavior:False Misbehavior:
A malicious node could attempt to partition the network by claiming that
some node following it in the path are misbehaving.
 Collusion:Collusion:
Multiple nodes in collusion can amount a more sophisticated attack.
 Partial dropping:Partial dropping:
A node can circumvent the watchdog b dropping packets at a lower rate
than the watchdog’s configured minimum misbehavior threshold
WatchdogWatchdog
 For the watchdog to work properly, it must know
where a packet should be in two hops.
 The watchdog has this information because DSR
is a source routing protocol.
 If the watchdog does not have this information,
then a malicious or broken node could broadcast
the packet to a non-existent node and the
watchdog would have no way of knowing.
 Because of this limitation, watchdog work best on
top of a source routing protocol.
PathraterPathrater
Dynamic Source Routing Extensions
 The pathrater, run by each node in the network,
combines knowledge of misbehaving nodes with
link reliability data to pick the route most likely to
be reliable.
 It calculates a path metric by averaging the node
ratings in the path. We choose this metric
because it gives a comparison of the overall
reliability of different paths
PathraterPathrater
Dynamic Source Routing Extensions
 Avoids routing packets through malicious nodes
 Each node maintains a rating for every other node
 A node is assigned as a “neutral” rating of 0.5
 The rating of nodes on all actively used path
increase by 0.01 at periodic intervals of 200 ms
 The rating of nodes decrease 0.05 when a link
break is detected
 High negative numbers are assigned to nodes
suspected of misbehaving nodes by Watchdog
PathraterPathrater
Dynamic Source Routing Extensions
 Based on Pathrater on Source
A2
S D
C2B2
A1 C1B1Pathrater
built in
1. Route Discovery
0.5 ---initial
0.01+0.5---200ms
0.01+0.5.01---200ms
0.01+0.5.02---200ms
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
0.01+0.502---200ms
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
-0.01+0.502---200ms
0.5 ---initial
-100 by waychdog---200ms
0.5 ---initial
0.01+0.5---200ms
-0.01+0.501---200ms
-0.01+0.500---200ms
S->A1->B1->C1->D
S->A2->B2->C2->D
S->A2->B1->C1->D
Route Cache
0.5 ---initial
0.01+0.5---200ms
0.01+0.501---200ms
0.01+0.502---200ms
PathraterPathrater
Dynamic Source Routing Extensions
 Based on Pathrater on Source
A2
S D
C2B2
A1 C1B1S->A1->B1->C1->D
Highest reliable way
2. Data transmission
PathraterPathrater
Dynamic Source Routing Extensions
 It calculates a path metric by averaging the node
rating in the path
 If there are multiple paths, the node chooses the
path with the highest metric
 It increases the throughput
 It gives a comparison of the overall reliability of
different paths
 It increases the ratio of overhead transmissions to
data transmission
MethodologyMethodology
OverviewOverview
 Assumptions
– Bidirectional communication
– Wireless interfaces that support promiscuous mode
operation
 Setup
– 50 nodes in various states of mobility
– Created 4 different extension scenarios (WD, PR,
SRR)
– Varied misbehaving nodes 0% to 40%
MethodologyMethodology
SimulatorSimulator
 Version of Berkeley’s Network Simulator.
 Includes wireless extensions made by the CMU
Monarch project.
 Visualization tool from CMU called ad-hockey.
 To view the results of the simulations and detect overall
trends in the network.
 Simulations take place in a 670x670 meter flat
space filled with a scattering of 50 wireless nodes.
MethodologyMethodology
Misbehaving Nodes
 Of the 50 nodes in the simulated network, some
variable percentage of the nodes misbehave.
 In this simulation a misbehaving node is one that
agrees to participate in forwarding packets but then
indiscriminately drops all data packets that are routed
through it.
 The percentage of misbehaving nodes in this
network vary from 0% to 40% in 5% increments.
MethodologyMethodology
Metrics
 The following three metrics are used:
 Throughput:Throughput: % of sent data packets actually received in
the intended destinations.
 OverheadOverhead: ratio routing-related transmissions to data
transmissions in a simulation.
 Effects of watchdogEffects of watchdog false positivefalse positive on networkon network
throughputthroughput: The impact when watchdog mistakes a
node as misbehaving
Simulation ResultsSimulation Results
 The focus is on three metrics evaluation
 Network throughputNetwork throughput
 Routing overheadRouting overhead
 Effects of false positives on throughputEffects of false positives on throughput
 The utility of various combinations of the
extensions are tested:
 Watchdog (WD)Watchdog (WD)
 Pathrater (PR)Pathrater (PR)
 Send (extra) route request (SRR)Send (extra) route request (SRR)
SRR extension in used to find new paths when all
known paths include a suspected misbehaving node.
Network ThroughputNetwork Throughput
 Network ThroughputNetwork Throughput
 Everything enabled
 Watchdog and pathrater enabled
 Only pathrater enabled
 Everything disabled
Figure 5 shows the total network throughput,
calculated as the fraction of data packets generated
that are received, versus the fraction of misbehaving
nodes in the network for the combinations of
extensions.
 Network ThroughputNetwork Throughput
Figure 5 (a) 0 second pause time
 Network ThroughputNetwork Throughput
Figure 5 (b) 60 second pause time
 Network ThroughputNetwork Throughput
As expected, the simulations with all three extensions
active perform the best by a considerable margin as
misbehaving nodes are added to the network.
OverheadOverhead
 Routing OverheadRouting Overhead
 Everything on
 Pathrater and watchdog on
 Only watchdog on
 Everything off
Figure 6 shows the amount of overhead incurred
(causes) by activating the different routing
extensions. It shows routing overhead as a ratio of
routing packet transmissions to data packet
transmissions. This ratio is plotted against the
fraction of misbehaving nodes.
 Routing OverheadRouting Overhead
Figure 6 (a) 0 second pause time
 Routing OverheadRouting Overhead
Figure 6 (b) 60 second pause time
 Routing OverheadRouting Overhead
Effects on False DetectionEffects on False Detection
 Effects on False DetectionEffects on False Detection
 Compare simulations of the regular watchdog with a
watchdog that does not report false positives
Figure 7 shows the network throughput lost by the
watchdog incorrectly reporting well-behaved nodes.
These results show that throughput is not
appreciably affected by false positives and that they
may even have beneficial side effects.
 Effects on False DetectionEffects on False Detection
Figure 7 (a) 0 second pause time
 Effects on False DetectionEffects on False Detection
Figure 7 (b) 60 second pause time
 Effects on False DetectionEffects on False Detection
Table 3 shows the average value of false positives
reported by the simulation ran for each pause time
and misbehaving node percentage.
More false positives are reported in the 0 seconds
pause time simulations as compared to the 60
seconds pause time simulations.
 No significant related work before publication date in
2000.
 DSR, AODV, TORA, DSDV, STAR only detect if the
receiver’s network interface is accepting packets.
 Some recent related work:
– T. GoffNael, B. Abu-Ghazaleh, D. S. Phatak, and R. Kahvecioglu,
"Preemptive Routing in Ad-Hoc Networks," presented at Seventh annual
international conference on Mobile computing and networking, 2001.
– Y.-C. Hu, A. Perrig, and D. B. Johnson, "Adrianne: A Secure On-Demand
Routing Protocol," presented at Eight Annual International Conference on
Mobile Computing and Networking, Atlanta, GA,2002.
– B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand
Secure Routing Protocol Resilient to Byzantine Failures,"presented at
ACM Workshop on Wireless Security, Atlanta, GA,2002.
Related WorkRelated Work
 To conduct a more rigorous tests of the watchdog
and pathrater parameters to determine optimal
values to increase throughput in different situations.
 Rating increment and decrement amounts
 Rate incrementing interval
 Delay between sending out route requests to decrease
the overhead caused by this feature
 Next goal is to analyze how the routing extensions
perform with TCP flows common to most network
applications.
 Evaluate the watchdog and pathrater considering
latency in addition to throughput.
Future WorkFuture Work
 Ad hoc networks are vulnerable to nodes that
misbehave when routing packets
 Simulation evaluates that the 2 techniques
– increases throughput by 17% in network with
moderate mobility, while increase ratio of overhead
to data transmission from 9% to 17%
– increases throughput by 27% in network with
extreme mobility, while increase ratio of overhead
to data transmission from 12% to 24%
ConclusionConclusion

More Related Content

What's hot

Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Shanka Mahakumbura
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
@zenafaris91
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
MoctardOLOULADE
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
Faisal Mehmood
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
Keyur Vadodariya
 
Lossless predictive coding
Lossless predictive codingLossless predictive coding
Lossless predictive coding
Fahad Israr
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
Adeel Rasheed
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
4. Analog to digital conversation (1).ppt
4. Analog to digital conversation (1).ppt4. Analog to digital conversation (1).ppt
4. Analog to digital conversation (1).ppt
test22333
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
TechStudent1
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
Ashraf Uddin
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 

What's hot (20)

Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
Lossless predictive coding
Lossless predictive codingLossless predictive coding
Lossless predictive coding
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
4. Analog to digital conversation (1).ppt
4. Analog to digital conversation (1).ppt4. Analog to digital conversation (1).ppt
4. Analog to digital conversation (1).ppt
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 

Similar to Mitigating routing misbehavior in mobile ad hoc networks

Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
ijsrd.com
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
IJERD Editor
 
Nodes bearing grudges
Nodes bearing grudgesNodes bearing grudges
Nodes bearing grudges
Paul Yang
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Baddam Akhil Reddy
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
cscpconf
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
IOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
IJMER
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
Alexander Decker
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
cscpconf
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
Alexander Decker
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
IJRAT
 
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODELSUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
cscpconf
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 

Similar to Mitigating routing misbehavior in mobile ad hoc networks (20)

Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Nodes bearing grudges
Nodes bearing grudgesNodes bearing grudges
Nodes bearing grudges
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODELSUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 

More from Paul Yang

release_python_day4_slides_201606_1.pdf
release_python_day4_slides_201606_1.pdfrelease_python_day4_slides_201606_1.pdf
release_python_day4_slides_201606_1.pdf
Paul Yang
 
release_python_day3_slides_201606.pdf
release_python_day3_slides_201606.pdfrelease_python_day3_slides_201606.pdf
release_python_day3_slides_201606.pdf
Paul Yang
 
release_python_day1_slides_201606.pdf
release_python_day1_slides_201606.pdfrelease_python_day1_slides_201606.pdf
release_python_day1_slides_201606.pdf
Paul Yang
 
release_python_day2_slides_201606.pdf
release_python_day2_slides_201606.pdfrelease_python_day2_slides_201606.pdf
release_python_day2_slides_201606.pdf
Paul Yang
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
Paul Yang
 
Intel® AT-d Validation Overview v0_3.pdf
Intel® AT-d Validation Overview v0_3.pdfIntel® AT-d Validation Overview v0_3.pdf
Intel® AT-d Validation Overview v0_3.pdf
Paul Yang
 
HP Performance Tracking ADK_part1.pdf
HP Performance Tracking ADK_part1.pdfHP Performance Tracking ADK_part1.pdf
HP Performance Tracking ADK_part1.pdf
Paul Yang
 
HP Performance Tracking ADK part2.pdf
HP Performance Tracking ADK part2.pdfHP Performance Tracking ADK part2.pdf
HP Performance Tracking ADK part2.pdf
Paul Yang
 
Determination of Repro Rates 20140724.pdf
Determination of Repro Rates 20140724.pdfDetermination of Repro Rates 20140724.pdf
Determination of Repro Rates 20140724.pdf
Paul Yang
 
Debug ADK performance issue 20140729.pdf
Debug ADK performance issue 20140729.pdfDebug ADK performance issue 20140729.pdf
Debug ADK performance issue 20140729.pdf
Paul Yang
 
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
Paul Yang
 
A brief study on bottlenecks to Intel vs. Acer v0.1.pdf
A brief study on bottlenecks to Intel vs. Acer v0.1.pdfA brief study on bottlenecks to Intel vs. Acer v0.1.pdf
A brief study on bottlenecks to Intel vs. Acer v0.1.pdf
Paul Yang
 
出租店系統_楊曜年_林宏庭_OOD.pdf
出租店系統_楊曜年_林宏庭_OOD.pdf出租店系統_楊曜年_林宏庭_OOD.pdf
出租店系統_楊曜年_林宏庭_OOD.pdf
Paul Yang
 
Arm Neoverse market update_05122020.pdf
Arm Neoverse market update_05122020.pdfArm Neoverse market update_05122020.pdf
Arm Neoverse market update_05122020.pdf
Paul Yang
 
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Paul Yang
 
Agile & Secure SDLC
Agile & Secure SDLCAgile & Secure SDLC
Agile & Secure SDLC
Paul Yang
 
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
Routing Security and Authentication Mechanism for Mobile Ad Hoc NetworksRouting Security and Authentication Mechanism for Mobile Ad Hoc Networks
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
Paul Yang
 
Clients developing_chunghwa telecom
Clients developing_chunghwa telecomClients developing_chunghwa telecom
Clients developing_chunghwa telecom
Paul Yang
 
English teaching in icebreaker and grammar analysis
English teaching in icebreaker and grammar analysisEnglish teaching in icebreaker and grammar analysis
English teaching in icebreaker and grammar analysis
Paul Yang
 
Study mapapi v0.1
Study mapapi v0.1Study mapapi v0.1
Study mapapi v0.1
Paul Yang
 

More from Paul Yang (20)

release_python_day4_slides_201606_1.pdf
release_python_day4_slides_201606_1.pdfrelease_python_day4_slides_201606_1.pdf
release_python_day4_slides_201606_1.pdf
 
release_python_day3_slides_201606.pdf
release_python_day3_slides_201606.pdfrelease_python_day3_slides_201606.pdf
release_python_day3_slides_201606.pdf
 
release_python_day1_slides_201606.pdf
release_python_day1_slides_201606.pdfrelease_python_day1_slides_201606.pdf
release_python_day1_slides_201606.pdf
 
release_python_day2_slides_201606.pdf
release_python_day2_slides_201606.pdfrelease_python_day2_slides_201606.pdf
release_python_day2_slides_201606.pdf
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
 
Intel® AT-d Validation Overview v0_3.pdf
Intel® AT-d Validation Overview v0_3.pdfIntel® AT-d Validation Overview v0_3.pdf
Intel® AT-d Validation Overview v0_3.pdf
 
HP Performance Tracking ADK_part1.pdf
HP Performance Tracking ADK_part1.pdfHP Performance Tracking ADK_part1.pdf
HP Performance Tracking ADK_part1.pdf
 
HP Performance Tracking ADK part2.pdf
HP Performance Tracking ADK part2.pdfHP Performance Tracking ADK part2.pdf
HP Performance Tracking ADK part2.pdf
 
Determination of Repro Rates 20140724.pdf
Determination of Repro Rates 20140724.pdfDetermination of Repro Rates 20140724.pdf
Determination of Repro Rates 20140724.pdf
 
Debug ADK performance issue 20140729.pdf
Debug ADK performance issue 20140729.pdfDebug ADK performance issue 20140729.pdf
Debug ADK performance issue 20140729.pdf
 
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
A Special-Purpose Peer-to-Peer File Sharing System for Mobile ad Hoc Networks...
 
A brief study on bottlenecks to Intel vs. Acer v0.1.pdf
A brief study on bottlenecks to Intel vs. Acer v0.1.pdfA brief study on bottlenecks to Intel vs. Acer v0.1.pdf
A brief study on bottlenecks to Intel vs. Acer v0.1.pdf
 
出租店系統_楊曜年_林宏庭_OOD.pdf
出租店系統_楊曜年_林宏庭_OOD.pdf出租店系統_楊曜年_林宏庭_OOD.pdf
出租店系統_楊曜年_林宏庭_OOD.pdf
 
Arm Neoverse market update_05122020.pdf
Arm Neoverse market update_05122020.pdfArm Neoverse market update_05122020.pdf
Arm Neoverse market update_05122020.pdf
 
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
 
Agile & Secure SDLC
Agile & Secure SDLCAgile & Secure SDLC
Agile & Secure SDLC
 
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
Routing Security and Authentication Mechanism for Mobile Ad Hoc NetworksRouting Security and Authentication Mechanism for Mobile Ad Hoc Networks
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
 
Clients developing_chunghwa telecom
Clients developing_chunghwa telecomClients developing_chunghwa telecom
Clients developing_chunghwa telecom
 
English teaching in icebreaker and grammar analysis
English teaching in icebreaker and grammar analysisEnglish teaching in icebreaker and grammar analysis
English teaching in icebreaker and grammar analysis
 
Study mapapi v0.1
Study mapapi v0.1Study mapapi v0.1
Study mapapi v0.1
 

Recently uploaded

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (12)

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

Mitigating routing misbehavior in mobile ad hoc networks

  • 1. 1 Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker Department of Computer Science, Stanford University IEEE Communications Magazine October 2002 報告者 : 楊曜年 指導教授 : 劉如生 博 士
  • 2. OverviewOverview  “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Sergio Marti,T.J. Giuli, Kevin Lai, and Mary Baker,MobiCom 2000  Introduces two techniques that improve throughput in an ad hoc network in the presence of “misbehaving” nodes.
  • 3. OutlineOutline  Introduction  Assumptions  Dynamic Source Routing (DSR) -Watchdog -Pathrater  Methodology  Movement and Communication Patterns  Misbehaving Nodes  Metrics  Simulation Results  Related Work  Future Work and Conclusion
  • 4. IntroductionIntroduction  There will be a tremendous growth over the next decade in the use of wireless communication.  Advantage:Advantage: ability to transmit data among users in a common area while remaining mobile.  Disadvantage:Disadvantage: the distance between participants is limited by a range of transmitters or their proximity to wireless access points  Solution:Solution: Ad hoc wireless networks mitigate this problem by allowing out of range nodes to route data through intermediate nodes.
  • 5.  Ad hoc networks are ideal in situations where installing an infrastructure is not possible because the infrastructure is too expensive or too vulnerable, the network is too transient or the infrastructure was destroyed. e.g. battlefields, military applications , emergency and disaster situation IntroductionIntroduction
  • 6.  Node may misbehave by agreeing to forward packets and then failing to do so, because it is:  Overloaded nodeOverloaded node – lacks the CPU cycles, buffer space or available network bandwidth to forward packets.  Selfish nodeSelfish node – unwilling to spend battery life, CPU cycles, or available network bandwidth to forward packets not of direct interest to it.  Malicious nodeMalicious node – launches a denial of service attack by dropping packets.  Broken nodesBroken nodes – might have a software fault that prevents it from forwarding packets. IntroductionIntroduction
  • 7.  To mitigate the effects of routing misbehavior, it is introduced two extensions to the Dynamic Source Routing algorithm (DSR)  Watchdog:Watchdog: identifies misbehaving nodes.  Pathrater:Pathrater: avoids routing packets through these nodes.  The two techniques increase throughput by 17% in the presence of up to 40% misbehaving nodes.  During extreme mobility, they can increase network throughput by 27%. IntroductionIntroduction
  • 8.  Bidirectional communication symmetry on every link between nodes.  Watchdog mechanism relies on bidirectional links.Watchdog mechanism relies on bidirectional links.  Wireless interface that support promiscuous mode operation.  Promiscuous mode means that if a node A is within a range of a node B, it can overhear communications to and from B even if those communications do not directly involve A.  Useful for improving routing protocol performance.Useful for improving routing protocol performance. AssumptionsAssumptions
  • 9.  DSR is an on-demand, source routing protocol.  Route paths are discovers at the time a source send aRoute paths are discovers at the time a source send a packet to a destination for which the source has nopacket to a destination for which the source has no path.path.  DSR is divided into two main functions:  Route discoveryRoute discovery  Route maintenanceRoute maintenance Dynamic Source RoutingDynamic Source Routing (DSR)(DSR)
  • 10.  Route Discovery:Route Discovery: Figure 1 – Example of a route request a. Node S sends out a ROUTE REQUEST packet to find a path to node D
  • 11. b. The ROUTE REQUEST is forwarded throughout the network, each node adding its address to the packet  Route Discovery:Route Discovery: Figure 1 – Example of a route request
  • 12. c. D sends back a ROUTE REPLY to S using the path contained in one of the ROUTE REQUEST packet that reached it  Route Discovery:Route Discovery: Figure 1 – Example of a route request
  • 13.  Route Maintenance:Route Maintenance:  Handles link breaks – link breaks occurs when two nodes on a path are no longer in transmission range.  If an intermediate node detects a link break when forwarding a packet to the next node in the route path,  It sends back a message to the source notifying it of that link break.  The source must try another path or do a route discovery if it does not have another path.
  • 14. WatchdogWatchdog  Identifies misbehaving nodes  Maintains a buffer of transmitted packets  Monitors next hop node’s transmission  Increments a failure tally for the nodes AS DCB
  • 16. WatchdogWatchdog  Packet Radio Network Schemes ---passive acknowledgement B C E F J G E tries to transmit to B but fails F and J hear transmission and will forward F sends first J removes packet from its queue Route from E to C
  • 17.  Advantage:Advantage: it can detect misbehavior at the forwarding level and not just the link level.  Weakness:Weakness: it might not detect a misbehaving node in the presence of:  Ambiguous collision  Receiver collision  Limited transmission power  False misbehavior  Collusion  Partial dropping WatchdogWatchdog
  • 18. WatchdogWatchdog  Ambiguous collision:Ambiguous collision: Figure 3 – Illustrate a packet collusion can occur at A while it is listening for B to forward on a packet.  Receiver collision:Receiver collision: Figure 4 – Illustrate node A can only tell whether B sends the packet to C, but it cannot tell if C receives it.
  • 19. WatchdogWatchdog  Limited transmission:Limited transmission: A node could limit its transmission power such that the signal is strong enough to be overheard by the previous node but too weak to be received by the true recipient.  False Misbehavior:False Misbehavior: A malicious node could attempt to partition the network by claiming that some node following it in the path are misbehaving.  Collusion:Collusion: Multiple nodes in collusion can amount a more sophisticated attack.  Partial dropping:Partial dropping: A node can circumvent the watchdog b dropping packets at a lower rate than the watchdog’s configured minimum misbehavior threshold
  • 20. WatchdogWatchdog  For the watchdog to work properly, it must know where a packet should be in two hops.  The watchdog has this information because DSR is a source routing protocol.  If the watchdog does not have this information, then a malicious or broken node could broadcast the packet to a non-existent node and the watchdog would have no way of knowing.  Because of this limitation, watchdog work best on top of a source routing protocol.
  • 21. PathraterPathrater Dynamic Source Routing Extensions  The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable.  It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths
  • 22. PathraterPathrater Dynamic Source Routing Extensions  Avoids routing packets through malicious nodes  Each node maintains a rating for every other node  A node is assigned as a “neutral” rating of 0.5  The rating of nodes on all actively used path increase by 0.01 at periodic intervals of 200 ms  The rating of nodes decrease 0.05 when a link break is detected  High negative numbers are assigned to nodes suspected of misbehaving nodes by Watchdog
  • 23. PathraterPathrater Dynamic Source Routing Extensions  Based on Pathrater on Source A2 S D C2B2 A1 C1B1Pathrater built in 1. Route Discovery 0.5 ---initial 0.01+0.5---200ms 0.01+0.5.01---200ms 0.01+0.5.02---200ms 0.5 ---initial 0.01+0.5---200ms 0.01+0.501---200ms 0.01+0.502---200ms 0.5 ---initial 0.01+0.5---200ms 0.01+0.501---200ms -0.01+0.502---200ms 0.5 ---initial -100 by waychdog---200ms 0.5 ---initial 0.01+0.5---200ms -0.01+0.501---200ms -0.01+0.500---200ms S->A1->B1->C1->D S->A2->B2->C2->D S->A2->B1->C1->D Route Cache 0.5 ---initial 0.01+0.5---200ms 0.01+0.501---200ms 0.01+0.502---200ms
  • 24. PathraterPathrater Dynamic Source Routing Extensions  Based on Pathrater on Source A2 S D C2B2 A1 C1B1S->A1->B1->C1->D Highest reliable way 2. Data transmission
  • 25. PathraterPathrater Dynamic Source Routing Extensions  It calculates a path metric by averaging the node rating in the path  If there are multiple paths, the node chooses the path with the highest metric  It increases the throughput  It gives a comparison of the overall reliability of different paths  It increases the ratio of overhead transmissions to data transmission
  • 26. MethodologyMethodology OverviewOverview  Assumptions – Bidirectional communication – Wireless interfaces that support promiscuous mode operation  Setup – 50 nodes in various states of mobility – Created 4 different extension scenarios (WD, PR, SRR) – Varied misbehaving nodes 0% to 40%
  • 27. MethodologyMethodology SimulatorSimulator  Version of Berkeley’s Network Simulator.  Includes wireless extensions made by the CMU Monarch project.  Visualization tool from CMU called ad-hockey.  To view the results of the simulations and detect overall trends in the network.  Simulations take place in a 670x670 meter flat space filled with a scattering of 50 wireless nodes.
  • 28. MethodologyMethodology Misbehaving Nodes  Of the 50 nodes in the simulated network, some variable percentage of the nodes misbehave.  In this simulation a misbehaving node is one that agrees to participate in forwarding packets but then indiscriminately drops all data packets that are routed through it.  The percentage of misbehaving nodes in this network vary from 0% to 40% in 5% increments.
  • 29. MethodologyMethodology Metrics  The following three metrics are used:  Throughput:Throughput: % of sent data packets actually received in the intended destinations.  OverheadOverhead: ratio routing-related transmissions to data transmissions in a simulation.  Effects of watchdogEffects of watchdog false positivefalse positive on networkon network throughputthroughput: The impact when watchdog mistakes a node as misbehaving
  • 30. Simulation ResultsSimulation Results  The focus is on three metrics evaluation  Network throughputNetwork throughput  Routing overheadRouting overhead  Effects of false positives on throughputEffects of false positives on throughput  The utility of various combinations of the extensions are tested:  Watchdog (WD)Watchdog (WD)  Pathrater (PR)Pathrater (PR)  Send (extra) route request (SRR)Send (extra) route request (SRR) SRR extension in used to find new paths when all known paths include a suspected misbehaving node.
  • 31. Network ThroughputNetwork Throughput  Network ThroughputNetwork Throughput  Everything enabled  Watchdog and pathrater enabled  Only pathrater enabled  Everything disabled Figure 5 shows the total network throughput, calculated as the fraction of data packets generated that are received, versus the fraction of misbehaving nodes in the network for the combinations of extensions.
  • 32.  Network ThroughputNetwork Throughput Figure 5 (a) 0 second pause time
  • 33.  Network ThroughputNetwork Throughput Figure 5 (b) 60 second pause time
  • 34.  Network ThroughputNetwork Throughput As expected, the simulations with all three extensions active perform the best by a considerable margin as misbehaving nodes are added to the network.
  • 35. OverheadOverhead  Routing OverheadRouting Overhead  Everything on  Pathrater and watchdog on  Only watchdog on  Everything off Figure 6 shows the amount of overhead incurred (causes) by activating the different routing extensions. It shows routing overhead as a ratio of routing packet transmissions to data packet transmissions. This ratio is plotted against the fraction of misbehaving nodes.
  • 36.  Routing OverheadRouting Overhead Figure 6 (a) 0 second pause time
  • 37.  Routing OverheadRouting Overhead Figure 6 (b) 60 second pause time
  • 39. Effects on False DetectionEffects on False Detection  Effects on False DetectionEffects on False Detection  Compare simulations of the regular watchdog with a watchdog that does not report false positives Figure 7 shows the network throughput lost by the watchdog incorrectly reporting well-behaved nodes. These results show that throughput is not appreciably affected by false positives and that they may even have beneficial side effects.
  • 40.  Effects on False DetectionEffects on False Detection Figure 7 (a) 0 second pause time
  • 41.  Effects on False DetectionEffects on False Detection Figure 7 (b) 60 second pause time
  • 42.  Effects on False DetectionEffects on False Detection Table 3 shows the average value of false positives reported by the simulation ran for each pause time and misbehaving node percentage. More false positives are reported in the 0 seconds pause time simulations as compared to the 60 seconds pause time simulations.
  • 43.  No significant related work before publication date in 2000.  DSR, AODV, TORA, DSDV, STAR only detect if the receiver’s network interface is accepting packets.  Some recent related work: – T. GoffNael, B. Abu-Ghazaleh, D. S. Phatak, and R. Kahvecioglu, "Preemptive Routing in Ad-Hoc Networks," presented at Seventh annual international conference on Mobile computing and networking, 2001. – Y.-C. Hu, A. Perrig, and D. B. Johnson, "Adrianne: A Secure On-Demand Routing Protocol," presented at Eight Annual International Conference on Mobile Computing and Networking, Atlanta, GA,2002. – B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,"presented at ACM Workshop on Wireless Security, Atlanta, GA,2002. Related WorkRelated Work
  • 44.  To conduct a more rigorous tests of the watchdog and pathrater parameters to determine optimal values to increase throughput in different situations.  Rating increment and decrement amounts  Rate incrementing interval  Delay between sending out route requests to decrease the overhead caused by this feature  Next goal is to analyze how the routing extensions perform with TCP flows common to most network applications.  Evaluate the watchdog and pathrater considering latency in addition to throughput. Future WorkFuture Work
  • 45.  Ad hoc networks are vulnerable to nodes that misbehave when routing packets  Simulation evaluates that the 2 techniques – increases throughput by 17% in network with moderate mobility, while increase ratio of overhead to data transmission from 9% to 17% – increases throughput by 27% in network with extreme mobility, while increase ratio of overhead to data transmission from 12% to 24% ConclusionConclusion

Editor's Notes

  1. Figure 1 illustrates route discovery. Node S (the source) wishes to communicate with node D (the destination) but does not know any paths to D. S initiates a route discovery by broadcasting a route request packet to its neighbors that contains the destination address D. The neighbors in turn append their own addresses to the route request packet and rebroadcast it. This process continues until a route request packet reaches D. D must now send back a route reply packet to inform S of the discovered route. Since the route request packet that reaches D contains a path from S to D, D may choose to use the reverse path to send back the reply (bidirectional links are required here) or to initiate a new route discovery back to S. Since there can be many routes from a source to a destination, a source may receive multiple route replies from a destination. DSR caches these routes in a route cache for future use.
  2. *Source Route **Route Cache ***Route Discovery ****Target and Initiator *****Route Reply ******( Initiator Address and Request ID ) Source wanna send packet to Destination a.
  3. Figure 2 illustrates how the watchdog works. Suppose there exists a path from node S to D through intermediate nodes A, B, and C. Node A cannot transmit all the way to node C, but it can listen in on node B's traffic. Thus, when A transmits a packet for B to forward to C, A can often tell if B transmits the packet. If encryption is not performed separately for each link, which can be expensive, then A can also tell (know) if B has tampered with the payload or the header. many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission of lost or corrupted packets For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known as a passive acknowledgement [11].
  4. many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission of lost or corrupted packets For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known as a passive acknowledgement [11]. Half duplex operation: transmit packet, go into receive mode, receive ack, receive next packet, go into transmit mode, repeat Original sender hears forwarding transmission from next hop node in the route:Power control: transmit with enough power to be heard at D as well as F In addition, existing transport or application level replies or acknowledgements from the original destination could also be used as an acknowledgement that the route (or that hop of the route) is still working. As a last resort, a bit in the packet header could be included to allow a host transmitting a packet to request an explicit acknowledgement from the next-hop receiver. If no other acknowledgement signal has been received in some time from the next hop on some route, the host could use this bit to inexpensively probe the status of this hop on the route.
  5. many wireless networks utilize a hop-by-hop acknowledgement at the data link level in order to provide early detection and retransmission of lost or corrupted packets For example, in Figure 1, host A may be able to hear B’s transmission of the packet on to C. This type of acknowledgement is known as a passive acknowledgement [11]. Half duplex operation: transmit packet, go into receive mode, receive ack, receive next packet, go into transmit mode, repeat Original sender hears forwarding transmission from next hop node in the route:Power control: transmit with enough power to be heard at D as well as F In addition, existing transport or application level replies or acknowledgements from the original destination could also be used as an acknowledgement that the route (or that hop of the route) is still working. As a last resort, a bit in the packet header could be included to allow a host transmitting a packet to request an explicit acknowledgement from the next-hop receiver. If no other acknowledgement signal has been received in some time from the next hop on some route, the host could use this bit to inexpensively probe the status of this hop on the route.
  6. The ambiguous collision problem prevents A from overhearing transmissions from B. As Figure 3 illustrates, a packet collision can occur at A while it is listening for B to forward on a packet. A does not know if the collision was caused by B forwarding on a packet as it should or if B never forwarded the packet and the collision was caused by other nodes in A's neighborhood. Because of this uncertainty, A should not immediately accuse B of misbehaving, but should instead continue to watch B over a period of time. If A repeatedly fails to detect B forwarding on packets, then A can assume that B is misbehaving.
  7. Another problem can occur when nodes falsely report other nodes as misbehaving. A malicious node could attempt to partition the network by claiming that some nodes following it in the path are misbehaving. For instance, node A could report that node B is not forwarding packets when in fact it is. This will cause S to mark B as misbehaving when A is the culprit. This behavior, however, will be detected. Since A is passing messages on to B (as verified by S), then any acknowledgements from D to S will go through A to S, and S will wonder why it receives replies from D when supposedly B dropped packets in the forward direction. In addition, if A drops acknowledgements to hide them from S, then node B will detect this misbehavior and will report it to D Another problem is that a misbehaving node that can control its transmission power can circumvent the watchdog. A node could limit its transmission power such that the signal is strong enough to be overheard by the previous node but too weak to be received by the true recipient. This would require that the misbehaving node know the transmission power required to reach each of its neighboring nodes. Only a node with malicious intent would behave in this manner selfish nodes have nothing to gain since battery power is wasted and overloaded nodes would not relieve any congestion by doing this.
  8. The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm when no reliability information has been collected, as explained below. If there are multiple paths to the same destination, we choose the path with the highest metric. Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source routing protocol.The pathrater assigns ratings to nodes according to the following algorithm. Pathrather know status of every node through route discovery 2. The Pathrather assigns it a neutral rating of 0.5 3. A node always rates itself with a 1.0 4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. 5. When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5. A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected misbehaving nodes), the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. An actively used path is one on which the node has sent a packet within the previous rate increment interval. The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0. The pathrater does not modify the ratings of nodes that are not currently in active use. We assign a special highly negative value,
  9. The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm when no reliability information has been collected, as explained below. If there are multiple paths to the same destination, we choose the path with the highest metric. Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source routing protocol.The pathrater assigns ratings to nodes according to the following algorithm. Pathrather know status of every node through route discovery 2. The Pathrather assigns it a neutral rating of 0.5 3. A node always rates itself with a 1.0 4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. 5. When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5. A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected misbehaving nodes), the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. An actively used path is one on which the node has sent a packet within the previous rate increment interval. The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0. The pathrater does not modify the ratings of nodes that are not currently in active use. We assign a special highly negative value,
  10. The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm when no reliability information has been collected, as explained below. If there are multiple paths to the same destination, we choose the path with the highest metric. Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source routing protocol.The pathrater assigns ratings to nodes according to the following algorithm. Pathrather know status of every node through route discovery 2. The Pathrather assigns it a neutral rating of 0.5 3. A node always rates itself with a 1.0 4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. 5. When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5. A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected misbehaving nodes), the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. An actively used path is one on which the node has sent a packet within the previous rate increment interval. The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0. The pathrater does not modify the ratings of nodes that are not currently in active use. We assign a special highly negative value,
  11. The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm when no reliability information has been collected, as explained below. If there are multiple paths to the same destination, we choose the path with the highest metric. Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source routing protocol.The pathrater assigns ratings to nodes according to the following algorithm. Pathrather know status of every node through route discovery 2. The Pathrather assigns it a neutral rating of 0.5 3. A node always rates itself with a 1.0 4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. 5. When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5. A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected misbehaving nodes), the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. An actively used path is one on which the node has sent a packet within the previous rate increment interval. The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0. The pathrater does not modify the ratings of nodes that are not currently in active use. We assign a special highly negative value,
  12. The pathrater, run by each node in the network, combines knowledge of misbehaving nodes with link reliability data to pick the route most likely to be reliable. Each node maintains a rating for every other node which knows about in the network. It calculates a path metric by averaging the node ratings in the path. We choose this metric because it gives a comparison of the overall reliability of different paths and allows pathrater to emulate the shortest length path algorithm when no reliability information has been collected, as explained below. If there are multiple paths to the same destination, we choose the path with the highest metric. Note that this differs from standard DSR, which chooses the shortest path in the route cache. Further note that since the pathrater depends on knowing the exact path that a packet has traversed, it must be implemented on top of a source routing protocol.The pathrater assigns ratings to nodes according to the following algorithm. Pathrather know status of every node through route discovery 2. The Pathrather assigns it a neutral rating of 0.5 3. A node always rates itself with a 1.0 4. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. 5. When a node in the network becomes known to the pathrater (through route discovery), the pathrater assigns it a neutral rating of 0.5. A node always rates itself with a 1.0. This ensures that when calculating path rates, if all other nodes are neutral nodes (rather than suspected misbehaving nodes), the pathrater picks the shortest length path. The pathrater increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200 ms. An actively used path is one on which the node has sent a packet within the previous rate increment interval. The maximum value a neutral node can attain is 0.8. We decrement a node's rating by 0.05 when we detect a link break during packet forwarding and the node becomes unreachable. The lower bound rating of a neutral node is 0.0. The pathrater does not modify the ratings of nodes that are not currently in active use. We assign a special highly negative value,
  13. • Assumptions – Bidirectional communication – Wireless interfaces that support promiscuous mode operation • Setup – 50 nodes in various states of mobility – Created 4 different extension scenarios (WD, PR, SRR) – Varied misbehaving nodes 0% to 40%
  14. • Assumptions – Bidirectional communication – Wireless interfaces that support promiscuous mode operation • Setup – 50 nodes in various states of mobility – Created 4 different extension scenarios (WD, PR, SRR) – Varied misbehaving nodes 0% to 40%
  15. While a network with 40% misbehaving nodes may seem unrealistic, it is interesting to study the behavior of the algorithms in a more hostile environment than we hope to encounter in a real life.
  16. • Evaluation done on three metrics: – Throughput: % of sent data actually received by the intended destinations – Overhead: Ratio of routing-related transmission to data transmissions – Watchdog False Positives: The impact when watchdog mistakes a node as misbehaving
  17. • Best performance when all three extensions were active • Pathrater isolated in one test • Pathrater alone does not affect performance
  18. • Best performance when all three extensions were active • Pathrater isolated in one test • Pathrater alone does not affect performance
  19. • Increased overhead • Watchdog isolated in one simulation • Watchdog alone adds a little overhead
  20. c
  21. • Demonstrated how throughput is effected with the reporting of False Positives • Throughput does decrease but could result in beneficial side effects: – Helps determine unreliable nodes – Ambiguous collisions may help increase throughput – Nodes maintain a fresher route cache
  22. c
  23. c
  24. c
  25. Note that the simulations in this paper uses CBR data sources with no reliability requirements.