315 research outputs found
Manifestation and mitigation of node misbehaviour in adhoc networks
Mobile adhoc network is signified as a boon for advance and future wireless
communication system. Owing to its self-establishing network features and decentralization, the
system can actually establish a wireless communication with vast range of connectivity with the other
nodes. However, the system of MANET is also beheld with various technical impediments owing to its
inherent dynamic topologies. Although there are abundant volume of research work, but very few have
been able to effectively address the node misbehavior problems in MANET. The paper initially tries to
draw a line between different types of nodes in MANETs based on their behavior characteristics, then
reviews some of the significant contribution of the prior researches for addressing node misbehavior
issues. A major emphasis is laid on is the researches which use game theory as a tool to study and
address the misbehavior problems. The manuscript is developed considering some of the latest and
standard evidences of past 5 years and finally discusses the open issues related to the problems
Recommendation based trust model with an effective defence scheme for MANETs
YesThe reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment
Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade.
Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming
urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes.
There is a significant barrier to the applicability of existing routing approaches in conventional MANETs
when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application
tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes
must exchange multimedia signals for supporting real-time streaming applications. There exist two essential
security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the
attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each
other’s identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security
modeling statistics. This research harnesses the potential modeling aspect of game theory to model the
multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes
and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies.
The model advances each regular node’s capability to carry out precise computation about the opponent
player’s strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical
model in MATLAB ascertains that it outperforms the game theory’s baseline approach
Vehicle Authentication in Vehicular Ad-hoc Network using RSU Based Approach
Vehicular Ad Hoc Network (VANET) is a pervasive network where vehicles communicate with nearby vehicles and infrastructure nodes, such as Road-side unit (RSU). VANET is the subclass of Mobile Ad Hoc Network (MANET) in which nodes move randomly and are connected wirelessly. Information sharing among vehicles is an essential component of an intelligent traffic system (ITS), but security and privacy concerns must be taken into consideration. Security of the network can be improved by granting access only to authenticated vehicles. This research proposes an RSU based approach to authenticate vehicles and notify vehicles about unauthorized messages/vehicles. It helps in preventing other vehicles in the network from being influenced by the malicious vehicle. In this approach, Blockchain has been used to securely maintain the identity of all vehicles in the network. The use of this RSU based approach helps to reduce the computational overhead on the On-board unit (OBU) of individual vehicles and reduces the processing delay
Recommended from our members
Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks.
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significant issue in securing these environments to allow entities decide on the reliability and trustworthiness of other entities, besides it helps coping with defection problems and stimulating entities to cooperate. Recent models on evaluating trustworthiness in distributed systems have heavily focused on assessing trustworthiness of entities and isolate misbehaviours based on single trust metrics. Less effort has been put on the investigation of the subjective nature and differences in the way trustworthiness is perceived to produce a composite multidimensional trust metrics to overcome the limitation of considering single trust metric. In the light of this context, this thesis concerns the evaluation of entities’ trustworthiness by the design and investigation of trust metrics that are computed using multiple properties of trust and considering environment.
Based on the concept of probabilistic theory of trust management technique, this thesis models trust systems and designs cooperation techniques to evaluate trustworthiness in mobile ad hoc networks (MANETs). A recommendation based trust model with multi-parameters filtering algorithm, and multidimensional metric based on social and QoS trust model are proposed to secure MANETs. Effectiveness of each of these models in evaluating trustworthiness and discovering misbehaving nodes prior to interactions, as well as their influence on the network performance has been investigated. The results of investigating both the trustworthiness evaluation and the network performance are promising.Ministry of Higher Education in Libya and the Libyan Cultural Attaché bureau in Londo
- …