24 research outputs found

    Towards an Evaluation Model of Trust and Reputation Management Systems

    Get PDF
    The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal

    A Survey in Wireless Ad hoc Network Security and Secure Energy Optimization Approaches for Routing

    Get PDF
    Wireless ad hoc network nodes together establish a network infrastructure without using any access points or base stations for communicates using multi hop schemes. It has significant characteristics like dynamic topologies, constrained in bandwidth and limited resource a high challenge in implementing security with optimized energy resource utilization which is the key aspects while designing modern ad hoc networks architecture. Ad hoc Networks nodes are limited in broadcast range, and also their capabilities of computation and storage are well limited to their energy resources. This limitation of resources in wireless ad hoc creates high challenges in incorporating security mechanism for routing security and privacy maintenance. This paper investigates the various issues and challenges in secure routing and energy optimization during communication in wireless ad hoc network towards security and secure energy utilization improvisation

    Evaluation of detection method to mitigate DoS attacks in MANETs

    Get PDF
    A Mobile ad hoc Network (MANET) is a self-configure, dynamic, and non-fixed infrastructure that consists of many nodes. These nodes communicate with each other without an administrative point. However, due to its nature MANET becomes prone to many attacks such as DoS attacks. DoS attack is a severe as it prevents legitimate users from accessing to their authorised services. Monitoring, Detection, and rehabilitation (MrDR) method is proposed to detect DoS attacks. MrDR method is based on calculating different trust values as nodes can be trusted or not. In this paper, we evaluate the MrDR method which detect DoS attacks in MANET and compare it with existing method Trust Enhanced Anonymous on-demand routing Protocol (TEAP) which is also based on trust concept. We consider two factors to compare the performance of the proposed method to TEAP method: packet delivery ratio and network overhead. The results confirm that the MrDR method performs better in network performance compared to TEAP method

    A Novel Defense IPS Scheme against Wormhole Attack in MANET

    Get PDF
    The security is one of the major issue in Mobile Ad hoc Network (MANET). Each node in the Ad hoc network has work as router to take part in route establishment and data delivery in between sender and destination, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. Worm hole attack is a type of attack that are work as to established path in between sender and receiver but if the sender has start data transmission then in that case the worm hole attacker has create a direct link, referred to as a wormhole tunnel between them, it means more of the number of trusted nodes it means higher successful data communication process rates may well expected. In this paper we proposed Intrusion detection as well as prevention technique (IPS) against wormhole attack, for detection we use routing entry base detection technique and get attacker node information like node number, number of attack packet, attack time etc. after that we prevent wormhole attack using neighbor trust worthy base technique and secure the mobile ad-hoc network communication, through our proposal we provide secure as well as reliable communication and simulate through network simulator-2 and analyze the network behavior in attack and prevention case. After that we measure the performance of network on the bases of network parameter like throughput, packet delivery ratio, overall analysis, routing load etc

    Trust based flooding attack detection and response mechanisms for ad hoc on-demand distance vector routing protocol

    Get PDF
    Mobile Ad hoc Networks provide a structure-less environment, enabling participants in the coverage mobile nodes to communicate each other without using any centralized authentication agent. Thus, it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured routing protocols can detect internal Denial of Service (DoS) attacks by itself naturally. One of the most important and effective internal misbehaviors which has dramatic side effects on the network’s throughput is Flooding Attack. This project aims at proposing an alternative solution to detect and respond Flooding Attack in MANET which is based on cooperative trust evaluation mechanisms. Actually, this approach is matched to basic principles of distributed networks in which the participating nodes are responsible for any needed creation, operation and maintenance of the network. Moreover, it seems useful for high mobility networks where the suspicious nodes move around the area repeatedly. Consequently, the gained results of the project prove that the proposed Trust-based Cooperation mechanisms decreases the side effects of Flooding Attack on Ad-hoc On-demand Distance Vector routing protocol
    corecore