4,188 research outputs found
Cooperation Enforcement for Packet Forwarding Optimization in Multi-hop Ad-hoc Networks
Ad-hoc networks are independent of any infrastructure. The nodes are
autonomous and make their own decisions. They also have limited energy
resources. Thus, a node tends to behave selfishly when it is asked to forward
the packets of other nodes. Indeed, it would rather choose to reject a
forwarding request in order to save its energy. To overcome this problem, the
nodes need to be motivated to cooperate. To this end, we propose a
self-learning repeated game framework to enforce cooperation between the nodes
of a network. This framework is inspired by the concept of "The Weakest Link"
TV game. Each node has a utility function whose value depends on its
cooperation in forwarding packets on a route as well as the cooperation of all
the nodes that form this same route. The more these nodes cooperate the higher
is their utility value. This would establish a cooperative spirit within the
nodes of the networks. All the nodes will then more or less equally participate
to the forwarding tasks which would then eventually guarantee a more efficient
packets forwarding from sources to respective destinations. Simulations are run
and the results show that the proposed framework efficiently enforces nodes to
cooperate and outperforms two other self-learning repeated game frameworks
which we are interested in.Comment: Published in the proceedings of the IEEE Wireless Communications and
Networking Conference (WCNC 2012), Paris, France, 201
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks
The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, Trust and Reputation Management systems (TRM) have been developed to serve as measures in mitigating threats arising from unusual behaviours of nodes. In this paper we propose a candour-based trust and reputation system which measures and models reputation and trust propagation in MANETs. In the proposed model Dirichlet Probability Distribution is employed in modelling the individual reputation of nodes and the trust of each node is computed based on the node’s actual network performance and the quality of the recommendations it gives about other nodes. Cooperative nodes in our model will be rewarded for expanding their energy in forwarding packets for other nodes or for disseminating genuine recommenda-tions. Uncooperative nodes are isolated and denied the available network resources. We employed the Ruffle algorithm which will ensure that cooperative nodes are allowed to activate sleep mode when their service is not required in forwarding packets for its neighbouring trustworthy nodes. The proposed TRM system enshrines fairness in its mode of operation as well as creating an enabling environment free from bias. It will also ensure a connected and capacity preserving network of trustworthy node
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
- …