Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments

Unknown, Conference object English OPEN
Zakhary, Sameh R. ; Radenkovic, Milena (2010)

This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expiration timer that aim to deal with congestion and quick reputation convergence. We propose to use two different centrality measures for evaluation of the individual trust claims and resolving the aggregated ones. We design and build our prototype over AODV and test it in NS-2 in the presence of variable active blackhole attacks in highly mobile and sparse networks. Our results show that we achieve increased throughput while delay and jitter decrease and converge to AODV.
  • References (16)
    16 references, page 1 of 2

    [1]S. Buchegger, "Reputation Systems for Self-Organized Networks: Lessons Learned," In IEEE Technology and Society Magazine, Toward Fourth Generation Wireless, March 2008., pp. 1-10.

    [2]J. Ruiz, et al, "Black Hole Attack Injection in Ad hoc Networks," DSN2008, International Conference on Dependable Systems and Networks. Anchorage, Alaska, June 24-27 2008, pp. G34-G35.

    [3] Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In Proc. of IEEE/ACM MobiHOC, 2002. IEEE.

    [4]H. Yang, et al, "SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks," IEEE Network, vol. 24, 2006, pp. 1-13.

    [5]A. Dadhich, "A Distributed Cooperative Approach To Improve Detection And Removal Of Misbehaving MANET Nodes", COMSWARE, 2008, pp728 - 735 [6]P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks", Proc. IFIP CMS, 2002.

    [7]S. Buchegger and J.L. Boudec, "A robust reputation system for peer-to-peer and mobile ad-hoc networks", proc. of P2PEcon, 2004..

    [8]M.T. Schlosser, "The EigenTrust Algorithm for Reputation Management in P2P Networks," ReCALL, 2003.

    [9]H. Deng, W. Li, and D. P, "Routing Security in Wireless Ad Hoc Network", IEEE Communications Magzine, vol 40, 2002.

    [10]U. Jian Yin, Sanjay Kumar Madria, "A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks," IEEE-SUTC, vol. 1, 2006.

    [11]S. Ramaswamy et al., "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", ICWN'03, USA 2003..

  • Metrics
    No metrics available
Share - Bookmark