Browse > Article
http://dx.doi.org/10.3837/tiis.2019.12.023

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks  

Abbas, Sohail (Department of Computer Science, University of Sharjah, College of Sciences)
Merabti, Madjid (Department of Computer Science, University of Sharjah, College of Sciences)
Kifayat, Kashif (Department of Computer Science and Engineering, Air University)
Baker, Thar (Department of Computer Science, Liverpool John Moores University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.12, 2019 , pp. 6214-6242 More about this Journal
Abstract
Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.
Keywords
selfish node; reputation and trust systems; Sybil attacks; whitewashing; game theory;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Buttyan and J.-P. Hubaux, Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing, Cambridge University Press, 2007.
2 S. Seradji and M. S. Fallah, "A Bayesian Game of Whitewashing in Reputation Systems," The Computer Journal, vol. 60, no. 8, pp. 1223-1237, 2017.   DOI
3 N. Oualha and Y. Roudier, "A game theoretical approach in securing p2p storage against whitewashers," in Proc. of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises WETICE'09, pp. 128-133, 2009.
4 M. Feldman and J. Chuang, "The evolution of cooperation under cheap pseudonyms," in Proc. of Seventh IEEE International Conference on E-Commerce Technology, pp. 284-291, 2005.
5 D. Coppersmith and M. Jakobsson, "Almost optimal hash sequence traversal," in Proc. of International Conference on Financial Cryptography, pp. 102-119, 2002.
6 A. Osseiran, O. Elloumi, J. Song, and J. F. Monserrat, "Internet of Things," IEEE Communications Standards Magazine, vol. 1, no. 2, pp. 84-84, 2017.   DOI
7 S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Deterring Whitewashing Attacks in Reputation based Schemes for Mobile Ad hoc Networks," Wireless Days (WD), IEEE/IFIP, pp. 1-6, 2010.
8 E. Biagioni and S. Giordano, "Ad Hoc and Sensor Networks [Series Editorial]," IEEE Communications Magazine, vol. 52, no, 7, pp. 140-140, 2014.   DOI
9 S. Fatih and S. Sevil, "A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV," Ad Hoc Networks, vol. 61, pp. 33-50, 2017.   DOI
10 G. Lav, J. Raj, and V. Gabor, "Survey of important issues in UAV communication networks," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1123-1152, 2016.   DOI
11 K. Hoffman, D. Zage, and C. Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems," ACM Computing Surveys, vol. 42, no. 1, pp. 1-31, 2009.
12 S. Abbas, M. Merabti, and D.Llewellyn-Jones, "A Survey of Reputation Based Schemes for MANET," in Proc. of The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 2010.
13 J. R. Douceur, "The Sybil Attack," in Proc. of First International Workshop on Peer-to-Peer Systems, pp. 251-260, 2002.
14 N. B. Margolin and B. N. Levine, "Quantifying Resistance to the Sybil Attack," presented at the Financial Cryptography and Data Security, pp. 1-15, 2008.
15 S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehaviour in Mobile Ad hoc Networks," in Proc. of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, United States, pp. 255-265, 2000.
16 S. Buchegger and J.-Y. L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in Proc. of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, Lausanne, Switzerland, pp. 226-236, 2002.
17 S. Buchegger and J.-Y. L. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. of P2PEcon, Harvard University, USA, 2004.
18 Y. Yoo, S. Ahn, and D. P. Agrawal, "A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks," in Proc. of the IEEE International Conference on Communications (ICC), 2005.
19 S. R. Zakhary and M. Radenkovic, "Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments," in Proc. of Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 161-167, 2010.
20 Z. Wei, H. Tang, F. R. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning," IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4647-4658, 2014.   DOI
21 Y. Zhang, L. Lazos, and W. Kozma, "AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 15, no. 8, pp. 1893-1907, 2016.   DOI
22 N. Kang, E. M. Shakshuki, and T. R. Sheltami, "Detecting Misbehaving Nodes in MANETs," in Proc. of the ACM 12th International Conference on Information Integration and Web-based Applications & Services, pp. 216-222, 2010.
23 L. Kejun, D. Jing, K. V. Pramod, and B. Kashyap, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.   DOI
24 K. Balakrishnan, J. Deng, and V. K. Varshney, "TWOACK: preventing selfishness in mobile ad hoc networks," in Proc. of IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2137-2142, 2005.
25 T. Shu and M. Krunz, "Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 14, no. 4, pp. 813-828, 2015.   DOI
26 N. Battat, A. Makhoul, H. Kheddouci, S. Medjahed, and N. Aitouazzoug, "Trust Based Monitoring Approach for Mobile Ad Hoc Networks," Lecture Notes in Computer Science: Ad-hoc, Mobile, and Wireless Networks, pp. 55-62, 2017.
27 L. Zhao and J. G. Delgado-Frias, "MARS: Misbehavior Detection in Ad Hoc Networks," in Proc. of the IEEE Global Telecommunications Conference (GLOBECOM), 2007.
28 E. Carrara and G. Hogben, "Reputation-based Systems: A Security Analysis," ENISA Position Paper No. 2, October 2007.
29 N. Marchang and R. Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks," IET Information Security, vol. 6, no. 2, pp. 77-83, 2012.   DOI
30 K. Graffi, P. S. Mogre, M. Hollick, and R. Steinmetz, "Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks," in Proc. of the IEEE Global Telecommunications Conference (GLOBECOM), 2007.
31 D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," Technical Report, Motorola and Cisco Systems, 2070-1721, 2001.
32 S. Buchegger and J.-Y. L. Boudec, "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks," in Proc. of WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, France, 2003.
33 J. Hu and M. Burmester, "LARS: A Locally Aware Reputation System for Mobile Ad hoc Networks," in Proc. of the 44th annual Southeast regional conference, Melbourne, Florida, pp. 119-123, 2006.
34 S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Identity-based Attacks against Reputation-based Systems in MANETs," in Proc. of 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2011), Liverpool, UK, 2011.
35 Y. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.   DOI
36 R. L. Rivest, "RFC 1321-The MD5 Message-Digest Algorithm," Technical report, MIT Laboratory for Computer Science and RSa Data Security, Inc., 1992.
37 M. Jakobsson, "Fractal hash sequence representation and traversal," in Proc. of Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on, p. 437, 2002.
38 C. Bettstetter, G. Resta, and P. Santi, "The node distribution of the random waypoint mobility model for wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 3, pp. 257-269, 2003.   DOI
39 G. Resta and P. Santi, "An analysis of the node spatial distribution of the random waypoint mobility model for ad hoc networks," in Proc. of The second ACM international workshop on Principles of mobile computing, Toulouse, France, pp. 44-50, 2002.
40 F. Milan, J. J. Jaramillo, and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes," in Proc. of Workshop on Game theory for communications and networks, p. 3, 2006.
41 Z. Li and H. Shen, "Analysis the cooperation strategies in mobile ad hoc networks," in Proc. of 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 880-885, 2008.
42 R. Axelrod, "The evolution of strategies in the iterated prisoner's dilemma," The dynamics of norms, pp. 1-16, 1987.
43 M. Felegyhazi, J. P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," Mobile Computing, IEEE Transactions on, vol. 5, no. 5, pp. 463-476, 2006.   DOI
44 J Ratliff Game Theory Lectures Notes.
45 P. Michiardi, Cooperation enforcement and network security mechanisms for mobile ad hoc networks, PhD Thesis, 2004.
46 O. Younes and N. Thomas, "Analysis of the expected number of hops in mobile ad hoc networks with random waypoint mobility," Electronic Notes in Theoretical Computer Science, vol. 275, pp. 143-158, 2011.   DOI
47 B. N. Levine, C. Shields, and N. B. Margolin, "A Survey of Solutions to the Sybil Attack," Technical Report 2006-052, University of Massachusetts Amherst, Amherst, MA, 2006.
48 S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks," in Proc. of Second International Conference on Developments in eSystems Engineering (DESE), pp. 190-195, 2009.
49 M. Faisal, S. Abbas, and H. U. Rahman, "Identity attack detection system for 802.11-based ad hoc networks," EURASIP Journal on Wireless Communications and Networking, journal article vol. 2018, no. 1, p. 128, 2018.   DOI
50 D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," in Proc. of Ad hoc networking (Ch 5): Addison-Wesley Longman Publishing Co., pp. 139-172, 2001.
51 J. J. Jaramillo and R. Srikant, "DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad-hoc Networks," in Proc. of The 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom'07), pp. 87-98, 2007.
52 J. Liu and V. Issarny, "An incentive compatible reputation mechanism for ubiquitous computing environments," International Journal of Information Security, vol. 6, no. 5, pp. 297-311, 2007.   DOI
53 K. Sydsaeter, A. Strom, and P. Berck, "Non-cooperative game theory," $Economists^{TM}$ Mathematical Manual,Springer, pp. 187-190, 2010.
54 Fujiwara-Greve and Takako, Non-cooperative game theory, Springer, 2015.