Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing

Paul Barom Jeon, George Kesidis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

In this paper, we propose a scheme for avoiding a malicious packet dropper by using multipath routing. In ad hoc wireless networks, most of the conventional routing protocols assume nodes are trustworthy and cooperative. Therefore, ad hoc wireless networks are more vulnerable to Denial of Service (DoS) attacks com- pared to wired networks or infrastructure-based wireless networks. A compromised node can obstruct network communication by simply dropping packets that are supposed to be forwarded. In our approach, messages are distributed over multiple paths between source and destination using ant-based routing. In proportion to the throughput of each path, a pheromone-aided routing table is updated and, subse-quently, paths that contain malicious nodes are naturally avoided. The simulation results show that our scheme can avoid most of the paths that contain malicious nodes.

Original languageEnglish (US)
Title of host publication43rd Annual Allerton Conference on Communication, Control and Computing 2005
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages1656-1665
Number of pages10
ISBN (Electronic)9781604234916
StatePublished - Jan 1 2005
Event43rd Annual Allerton Conference on Communication, Control and Computing 2005 - Monticello, United States
Duration: Sep 28 2005Sep 30 2005

Publication series

Name43rd Annual Allerton Conference on Communication, Control and Computing 2005
Volume3

Other

Other43rd Annual Allerton Conference on Communication, Control and Computing 2005
Country/TerritoryUnited States
CityMonticello
Period9/28/059/30/05

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing'. Together they form a unique fingerprint.

Cite this