Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks |
Abbas, Sohail
(Department of Computer Science, University of Sharjah, College of Sciences)
Merabti, Madjid (Department of Computer Science, University of Sharjah, College of Sciences) Kifayat, Kashif (Department of Computer Science and Engineering, Air University) Baker, Thar (Department of Computer Science, Liverpool John Moores University) |
1 | L. Buttyan and J.-P. Hubaux, Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing, Cambridge University Press, 2007. |
2 | S. Seradji and M. S. Fallah, "A Bayesian Game of Whitewashing in Reputation Systems," The Computer Journal, vol. 60, no. 8, pp. 1223-1237, 2017. DOI |
3 | N. Oualha and Y. Roudier, "A game theoretical approach in securing p2p storage against whitewashers," in Proc. of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises WETICE'09, pp. 128-133, 2009. |
4 | M. Feldman and J. Chuang, "The evolution of cooperation under cheap pseudonyms," in Proc. of Seventh IEEE International Conference on E-Commerce Technology, pp. 284-291, 2005. |
5 | D. Coppersmith and M. Jakobsson, "Almost optimal hash sequence traversal," in Proc. of International Conference on Financial Cryptography, pp. 102-119, 2002. |
6 | A. Osseiran, O. Elloumi, J. Song, and J. F. Monserrat, "Internet of Things," IEEE Communications Standards Magazine, vol. 1, no. 2, pp. 84-84, 2017. DOI |
7 | S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Deterring Whitewashing Attacks in Reputation based Schemes for Mobile Ad hoc Networks," Wireless Days (WD), IEEE/IFIP, pp. 1-6, 2010. |
8 | E. Biagioni and S. Giordano, "Ad Hoc and Sensor Networks [Series Editorial]," IEEE Communications Magazine, vol. 52, no, 7, pp. 140-140, 2014. DOI |
9 | S. Fatih and S. Sevil, "A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV," Ad Hoc Networks, vol. 61, pp. 33-50, 2017. DOI |
10 | G. Lav, J. Raj, and V. Gabor, "Survey of important issues in UAV communication networks," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1123-1152, 2016. DOI |
11 | K. Hoffman, D. Zage, and C. Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems," ACM Computing Surveys, vol. 42, no. 1, pp. 1-31, 2009. |
12 | S. Abbas, M. Merabti, and D.Llewellyn-Jones, "A Survey of Reputation Based Schemes for MANET," in Proc. of The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 2010. |
13 | J. R. Douceur, "The Sybil Attack," in Proc. of First International Workshop on Peer-to-Peer Systems, pp. 251-260, 2002. |
14 | N. B. Margolin and B. N. Levine, "Quantifying Resistance to the Sybil Attack," presented at the Financial Cryptography and Data Security, pp. 1-15, 2008. |
15 | S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehaviour in Mobile Ad hoc Networks," in Proc. of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, United States, pp. 255-265, 2000. |
16 | S. Buchegger and J.-Y. L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in Proc. of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, Lausanne, Switzerland, pp. 226-236, 2002. |
17 | S. Buchegger and J.-Y. L. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. of P2PEcon, Harvard University, USA, 2004. |
18 | Y. Yoo, S. Ahn, and D. P. Agrawal, "A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks," in Proc. of the IEEE International Conference on Communications (ICC), 2005. |
19 | S. R. Zakhary and M. Radenkovic, "Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments," in Proc. of Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 161-167, 2010. |
20 | Z. Wei, H. Tang, F. R. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning," IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4647-4658, 2014. DOI |
21 | Y. Zhang, L. Lazos, and W. Kozma, "AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 15, no. 8, pp. 1893-1907, 2016. DOI |
22 | N. Kang, E. M. Shakshuki, and T. R. Sheltami, "Detecting Misbehaving Nodes in MANETs," in Proc. of the ACM 12th International Conference on Information Integration and Web-based Applications & Services, pp. 216-222, 2010. |
23 | L. Kejun, D. Jing, K. V. Pramod, and B. Kashyap, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007. DOI |
24 | K. Balakrishnan, J. Deng, and V. K. Varshney, "TWOACK: preventing selfishness in mobile ad hoc networks," in Proc. of IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2137-2142, 2005. |
25 | T. Shu and M. Krunz, "Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 14, no. 4, pp. 813-828, 2015. DOI |
26 | N. Battat, A. Makhoul, H. Kheddouci, S. Medjahed, and N. Aitouazzoug, "Trust Based Monitoring Approach for Mobile Ad Hoc Networks," Lecture Notes in Computer Science: Ad-hoc, Mobile, and Wireless Networks, pp. 55-62, 2017. |
27 | L. Zhao and J. G. Delgado-Frias, "MARS: Misbehavior Detection in Ad Hoc Networks," in Proc. of the IEEE Global Telecommunications Conference (GLOBECOM), 2007. |
28 | E. Carrara and G. Hogben, "Reputation-based Systems: A Security Analysis," ENISA Position Paper No. 2, October 2007. |
29 | N. Marchang and R. Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks," IET Information Security, vol. 6, no. 2, pp. 77-83, 2012. DOI |
30 | K. Graffi, P. S. Mogre, M. Hollick, and R. Steinmetz, "Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks," in Proc. of the IEEE Global Telecommunications Conference (GLOBECOM), 2007. |
31 | D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," Technical Report, Motorola and Cisco Systems, 2070-1721, 2001. |
32 | S. Buchegger and J.-Y. L. Boudec, "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks," in Proc. of WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, France, 2003. |
33 | J. Hu and M. Burmester, "LARS: A Locally Aware Reputation System for Mobile Ad hoc Networks," in Proc. of the 44th annual Southeast regional conference, Melbourne, Florida, pp. 119-123, 2006. |
34 | S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Identity-based Attacks against Reputation-based Systems in MANETs," in Proc. of 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2011), Liverpool, UK, 2011. |
35 | Y. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003. DOI |
36 | R. L. Rivest, "RFC 1321-The MD5 Message-Digest Algorithm," Technical report, MIT Laboratory for Computer Science and RSa Data Security, Inc., 1992. |
37 | M. Jakobsson, "Fractal hash sequence representation and traversal," in Proc. of Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on, p. 437, 2002. |
38 | C. Bettstetter, G. Resta, and P. Santi, "The node distribution of the random waypoint mobility model for wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 3, pp. 257-269, 2003. DOI |
39 | G. Resta and P. Santi, "An analysis of the node spatial distribution of the random waypoint mobility model for ad hoc networks," in Proc. of The second ACM international workshop on Principles of mobile computing, Toulouse, France, pp. 44-50, 2002. |
40 | F. Milan, J. J. Jaramillo, and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes," in Proc. of Workshop on Game theory for communications and networks, p. 3, 2006. |
41 | Z. Li and H. Shen, "Analysis the cooperation strategies in mobile ad hoc networks," in Proc. of 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 880-885, 2008. |
42 | R. Axelrod, "The evolution of strategies in the iterated prisoner's dilemma," The dynamics of norms, pp. 1-16, 1987. |
43 | M. Felegyhazi, J. P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," Mobile Computing, IEEE Transactions on, vol. 5, no. 5, pp. 463-476, 2006. DOI |
44 | J Ratliff Game Theory Lectures Notes. |
45 | P. Michiardi, Cooperation enforcement and network security mechanisms for mobile ad hoc networks, PhD Thesis, 2004. |
46 | O. Younes and N. Thomas, "Analysis of the expected number of hops in mobile ad hoc networks with random waypoint mobility," Electronic Notes in Theoretical Computer Science, vol. 275, pp. 143-158, 2011. DOI |
47 | B. N. Levine, C. Shields, and N. B. Margolin, "A Survey of Solutions to the Sybil Attack," Technical Report 2006-052, University of Massachusetts Amherst, Amherst, MA, 2006. |
48 | S. Abbas, M. Merabti, and D. Llewellyn-Jones, "Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks," in Proc. of Second International Conference on Developments in eSystems Engineering (DESE), pp. 190-195, 2009. |
49 | M. Faisal, S. Abbas, and H. U. Rahman, "Identity attack detection system for 802.11-based ad hoc networks," EURASIP Journal on Wireless Communications and Networking, journal article vol. 2018, no. 1, p. 128, 2018. DOI |
50 | D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," in Proc. of Ad hoc networking (Ch 5): Addison-Wesley Longman Publishing Co., pp. 139-172, 2001. |
51 | J. J. Jaramillo and R. Srikant, "DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad-hoc Networks," in Proc. of The 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom'07), pp. 87-98, 2007. |
52 | J. Liu and V. Issarny, "An incentive compatible reputation mechanism for ubiquitous computing environments," International Journal of Information Security, vol. 6, no. 5, pp. 297-311, 2007. DOI |
53 | K. Sydsaeter, A. Strom, and P. Berck, "Non-cooperative game theory," Mathematical Manual,Springer, pp. 187-190, 2010. |
54 | Fujiwara-Greve and Takako, Non-cooperative game theory, Springer, 2015. |