Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks

In this paper, a new approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate in an ad hoc environment. The extended DSR protocol is tested under different scenarios by varying the number of malicious nodes and node moving speed. It is also tested varying the number of nodes in simulation used. The result indicates the achieved throughput by extended DSR is greater than the standard DSR and indicates the percentage of malicious drops over total drops are less in the case of extended DSR than the standard DSR.




References:
[1] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges:
Towards Routing Security, Fairness and robustness in Mobile ad hoc
networks. In proceedings of the Tenth Euromicro Workshop on Parallel,
Distributed and Network-based processing, Pages 403 - 410. Canary
Islands, Spain. January 2002. IEEE Computer Society.
[2] Yih-Chun Hu, David.B.Johnson, and Adrian Perrig. SEAD: Secure
Efficient Distance Vector Routing for Mobile Wireless ad hoc networks.
In proceedings of the 4th IEEE workshop on Mobile computing Systems
& Applications (WMCSA 2002), IEEE, Calicoon.NY. to appear, June
2002.
[3] Yih-Chun Hu, Adrian Perrig, and David.B.Johnson. Ariadne: A secure
on-Demand routing Protocol for ad hoc networks. Technical Report
Technical Report TR01-383, Department of Computer Science, Rice
University, December 2001.
[4] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing
misbehaviour in Mobile ad hoc networks. In Proceedings of MOBICOM
2000. Pages 255-265, 2000.
[5] Frank Stajano and Ross Anderson. The resurrecting Duckling, Lecturer
Notes in Computer Science, Springer - Verlag, 1999.
[6] Lidong Zhou and Zygmunt Haas. Securing ad hoc networks, In IEEE
Network Magazine, special issue on networking security, Vol.13, No.6,
November / December, Pages 24-30, 1999.
[7] Richard Dawkins. The selfish Gene. Oxford University press, 1980
edition, 1976.
[8] Sonja Buchegger and Jean-YvesLe Boudec. The selfish node: Increasing
routing security for mobile ad hoc networks. IBM Research Report. RR
3354, 2001.
[9] Kai Inkinen. New secure routing in ad hoc networks: Study and
Evaluation of proposed schemes. Seminar on Interworking HUT T-
110.551.