DOI QR코드

DOI QR Code

An Adaptive Security Model for Dynamic Node Behaviour in MANETs

  • Anand, Anjali (Computer Science and Engineering Department, Thapar University) ;
  • Rani, Rinkle (Computer Science and Engineering Department, Thapar University) ;
  • Aggarwal, Himanshu (Department of Computer Engineering, Punjabi University)
  • 투고 : 2017.03.06
  • 심사 : 2018.01.02
  • 발행 : 2018.06.30

초록

Mobile Ad hoc Networks (MANETs) have become a viable platform owing to their potential of providing communication without any pre-existing infrastructure and central administrating authority. Mutual support and co-operation among nodes are prerequisites for performing functions in such networks. The scarcity of resources makes it economical for nodes to conserve their resources and misbehave by avoiding participation in the network. Therefore, a mechanism is required to detect and handle such misbehaving nodes and promote co-operation in the network. Existing techniques for handling misbehaving nodes focus only on their current behaviour without considering the antecedent behaviour of nodes. In real world, a node may dynamically change its behaviour in accordance to its requirements. Hence, an efficient mechanism is required for providing security against such misbehaviour. This paper proposes an Adaptive Security Model which contemplates the present as well as anterior behaviour of nodes for providing security against dynamic node behaviour. The adaptivity of the model is nested in its ability to requite well-behaving nodes and penalize misbehaving ones in conformity with their overall behaviour. Simulation results indicate the efficiency of proposed scheme in securing the network from the menace of dynamic behaviour of nodes.

키워드

참고문헌

  1. H. Shen and Z. Li, "A Hierarchical Account-Aided Reputation Management System for MANETs," IEEE/ACM Transactions on Networking, vol. 23, no. 1, pp. 70-84, Feb. 2015. https://doi.org/10.1109/TNET.2013.2290731
  2. T. Eissa, S. Abdul Razak, R. Khokhar and N. Samian, "Trust-Based Routing Mechanism in MANET: Design and Implementation," Mobile Networks and Applications, vol.18, no. 5, pp. 666-677, October 2013. https://doi.org/10.1007/s11036-011-0328-0
  3. G. R Karri and P. M. Khilar, "Routing misbehavior detection and reaction in MANETs," in Proc. of Proceedings of IEEE International Conference on Industrial and Information Systems, pp. 80-85, July-August 2010.
  4. A. Dhir and J. Sengupta, "Security-aware optimized link routing protocol for mobile ad-hoc networks," KSII Transactions on Internet and Information Systems, vol. 3, no.1, pp. 52-83, February 2009. https://doi.org/10.3837/tiis.2009.01.003
  5. D.B. Johnson, D.A. Maltz and J. Broch, "DSR: The Dynamic Source Routing protocol for multi-hop wireless ad hoc networks," Ad Hoc Networking, Chapter 5, edited by C.E. Perkins, Addison-Wesley, pp. 139-172, 2001.
  6. R. Talreja and V. Jethani, "A vote based system to detect misbehaving nodes in MANETs," in Proc. of Proceedings of IEEE International Advance Computing Conference, pp. 391-394, 21-22 February 2014.
  7. X. Li, M. H. Ibrahim, S. Kumari, A. K. Sangaiah, V. Gupta and K.-K. R. Choo, "Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks," Computer Networks, March 2017.
  8. X. Li, J. Niu, S. Kumari, F. Wu and K.-K. R. Choo, "A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city," Future Generation Computer Systems, April 2017.
  9. X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah and K.-K. R. Choo, "A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments," Journal of Network and Computer Applications, July 2017.
  10. A. Konig, D. Seither, R. Steinmetz and M. Hollick, "An analytical model of routing, misbehavior and countermeasures in mobile ad hoc networks," in Proc. of Proceedings of IEEE Global Telecommunications Conference, pp. 1-6, 30 November- 4 December 2009.
  11. R. Nath, P.K. Sehgal, and A.K. Sethi, "Effect of routing misbehavior in mobile ad hoc network," in Proc. of Proceedings of Second IEEE Advance Computing Conference, pp. 218-222, 19-20 February 2010.
  12. S.N. Pari and D. Sridharan, "Mitigating routing misbehavior in self organizing mobile ad hoc network using K-neighbourhood local reputation system," in Proc. of Proceedings of IEEE International Conference on Recent Trends in Information Technology, pp. 313-317, 3-5 June 2011.
  13. M. Jo, L. Han, D. Kim and H.P. In,"Selfish Attacks and Detection in Cognitive Radio Ad-hoc Networks," IEEE Network, vol.27, no.3, pp.46-50, June 2013. https://doi.org/10.1109/MNET.2013.6523808
  14. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Technical Report, Stanford University, arXiv:cs.NI/0307012 v2, 2003.
  15. J. Hu and M. Burmester, "LARS: A locally aware reputation system for mobile ad hoc networks," in Proc. of Proceedings of the Forty Fourth annual Southeast Regional Conference, pp. 119-123, 10-12 March 2006.
  16. K. Gopalakrishnan and R. Uthariaraj, "Local monitoring based reputation system with alert to mitigate the misbehaving nodes in mobile ad hoc networks," in Proc. of Proceedings of International Conference of Information and Communication Technologies, CCIS, vol. 101, pp. 344-349, 7-9 September 2010.
  17. L. Buttyan and J.P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in Proc. of First ACM International symposium on Mobile Ad hoc Networking and Computing, pp. 87-96, 2000.
  18. S. Zhong, J. Chen and Y.R. Yang, "Sprite: a simple, cheat-proof credit-based system for mobile ad-hoc networks," in Proc. of Proceedings of Twenty-Second Annual Joint International Conference of the IEEE Computer and Communications, IEEE INFOCOM '03, vol. 3, pp. 1987-1997, 30 March- 3 April 2003.
  19. L. Buttyan and J.P. Hubaux, "Stimulating cooperation in self-organizing ad hoc networks," Mobility Networks and Application, vol. 8, no. 5, pp. 579-592, October 2003. https://doi.org/10.1023/A:1025146013151
  20. S. Buchegger and J.Y. Le Boudec, "Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)," in Proc. of MobiHOC 2002: IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 226-236, 2002.
  21. P. Michiardi. and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks," in Proc. of Proceedings of Sixth International Federation for Information Processing Conference on Security Communications and Multimedia Security, pp. 107-121, 26-27, September, 2002.
  22. J.N. Al-Karaki and A.E. Kamal, "Stimulating node cooperation in mobile ad hoc networks," Wireless Personal Communication. vol. 44, no. 6, pp. 219-239, 2008. https://doi.org/10.1007/s11277-007-9432-7
  23. T. Chen, F. Wu and S. Zhong, "FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks," IEEE Transactions on Computers, vol. 60, no. 7, pp.1045-1056, July 2011. https://doi.org/10.1109/TC.2010.162
  24. Z. Noorian, M. Noorian, M. Fleming and S. Marsh, "A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks," in Proc. of Proceedings of Twenty-Fifth Canadian Conference on Artificial Intelligence, pp. 145-157, 28-30 May 2012.
  25. B. Paramasivan, M.J.V. Prakash and M. Kaliappan, "Development of a secure routing protocol using game theory model in mobile ad hoc networks," Journal of Communications and Networks, vol. 17, no. 1, pp. 75-83, February 2015. https://doi.org/10.1109/JCN.2015.000012
  26. M. A. Azer and N. G. E. D. Saad, "MDAC: A new reputation system for misbehavior detection and control in ad hoc networks," in Proc. of Proceedings of IEEE International Computer Science and Engineering Conference, pp. 1-6, 23-26 November 2015.
  27. S. Jianhua, S and M. ChuanXiang, "A reputation-based scheme against malicious packet dropping for mobile ad hoc networks," in Proc. of Proceedings of IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 113-117, 20-22 November 2009.
  28. M. T. Refaei, L. A. DaSilva, M. Eltoweissy and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Transactions on Computers, vol. 59, no. 5, pp. 707-719, May 2010. https://doi.org/10.1109/TC.2010.34
  29. X. Gu, P. Lin and S. Shi, "A Novel Reputation Model Based on Subjective Logic for Mobile Ad Hoc Networks," Advanced Technology in Teaching, Advances in Intelligent and Soft Computing, vol.163 pp. 525-532, 2013.
  30. K. Liu, J. Deng, P. K. Varshney and K. Balakrishnan , "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol.6, no. 5, pp. 536-550, May 2007. https://doi.org/10.1109/TMC.2007.1036
  31. X. Mao and J. McNair, "Effect of on/off misbehavior on overhearing based co-operation scheme for MANET," in Proc. of Proceedings of Military Communications Conference, MILCOM 2010, pp. 1086-1091, 31 October-3 November 2010.
  32. T. Issariyakul and E. Hossain, "Introduction to network simulator NS2," Springer, 2nd Ed. USA, 2009.