Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges

Soufiene Djahel, Farid Nait-Abdesselam, Zonghua Zhang

Research output: Contribution to journalArticlepeer-review

109 Citations (Scopus)

Abstract

In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's packets in order to enable out of range communication. However, in hostile environments, some nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular communications. This type of misbehavior is generally referred to as packet dropping attack or black hole attack, which is considered as one of the most destructive attacks that leads to the network collapse. The special network characteristics, such as limited battery power and mobility, make the prevention techniques based on cryptographic primitives ineffective to cope with such attack. Rather, a more proactive alternative is required to ensure the safety of the forwarding function by staving off malicious nodes from being involved in routing paths. Once such scheme fails, some economic-based approaches can be adopted to alleviate the attack consequences by motivating the nodes cooperation. As a backup, detection and reaction schemes remain as the final defense line to identify the misbehaving nodes and punish them. In this paper, we make a comprehensive survey investigation on the state-of-the-art countermeasures to deal with the packet dropping attack. Furthermore, we examine the challenges that remain to be tackled by researchers for constructing an in-depth defense against such a sophisticated attack.
Original languageEnglish
Pages (from-to)658-672
Number of pages15
JournalIEEE Communications Surveys and Tutorials
Volume13
Issue number4
DOIs
Publication statusPublished - 23 Aug 2010
Externally publishedYes

Keywords

  • Ad Hoc Networks
  • Routing Protocols Security
  • Packet Dropping Attack
  • Black Hole Attack

Fingerprint

Dive into the research topics of 'Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges'. Together they form a unique fingerprint.

Cite this