1st International IEEE Conference on Pervasive Services

Research Article

On Securing MANET Routing Protocol Against Control Packet Dropping

  • @INPROCEEDINGS{10.1109/PERSER.2007.4283899,
        author={Djamel  Djenouri and Othmane  Mahmoudi and Mohamed  Bouamama and  David  Llewellyn-Jones  and Madjid  Merabti},
        title={On Securing MANET Routing Protocol Against Control Packet Dropping},
        proceedings={1st International IEEE Conference on Pervasive Services},
        publisher={IEEE},
        proceedings_a={ICPS},
        year={2007},
        month={8},
        keywords={Bayesian methods  Broadcasting  Computer crime  Computer networks  Laboratories  Mobile ad hoc networks  Monitoring  Proposals  Protection  Routing protocols},
        doi={10.1109/PERSER.2007.4283899}
    }
    
  • Djamel Djenouri
    Othmane Mahmoudi
    Mohamed Bouamama
    David Llewellyn-Jones
    Madjid Merabti
    Year: 2007
    On Securing MANET Routing Protocol Against Control Packet Dropping
    ICPS
    IEEE
    DOI: 10.1109/PERSER.2007.4283899
Djamel Djenouri1,*, Othmane Mahmoudi1,*, Mohamed Bouamama2,*, David Llewellyn-Jones 3,*, Madjid Merabti3,*
  • 1: Basic software Laboratory, CERIST, Algiers, Algeria
  • 2: Basic software Laboratory, CERIST, Algiers, Algeria.
  • 3: School of Computing and Mathematical Sciences, John Mooress University, Liverpool, UK
*Contact email: ddjenouri@mail.cerist.dz, o.mahmoudi@gmail.com, m.bouamama@gmail.com, D.Llewellyn-Jones@ljmu.ac.ukg, M.Merabti@ljmu.ac.ukg

Abstract

In this manuscript we deal with securing routing protocols of mobile ad hoc networks (MANETs) against packet dropping misbehavior. More specifically, we propose a solution to protect control packets of reactive source routing protocols against. Most current proposals focus on data packets. Nonetheless, dropping control packets may be beneficial for selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfish node could exclude itself from routes and thereby avoid receiving data packets to forward. Similarly, a malicious could drop RERR (Route Error) packets to keep the use of failed routes, potentially resulting in a denial of service. Our solution could be intergraded with any source routing protocol. For the implementation in this work, we have chosen one of the most secure protocols, namely ENDAIRA. We assess our solution by an extensive simulation study.