Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks

被引:11
作者
Kumar, Sunil [1 ]
Dutta, Kamlesh [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Hamirpur, Himachal Prades, India
关键词
MANETs; AODV; Selfish nodes; Direct trust; Indirect trust; Energy consumption; WIRELESS SENSOR NETWORKS; MANETS; MANAGEMENT; SYSTEM; MODEL;
D O I
10.1007/s11277-018-5804-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The applications and protocols conceived for mobile ad hoc networks rely on the assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All nodes have to spend their precious resources (e.g. battery power, memory, computational power, and network bandwidth) for routing and packet forwarding operations for other nodes, in a cooperative way in the network. However, there are some nodes that may intentionally turn themselves to behave selfishly in order to conserve their valuable resources. The selfish behaviour of such nodes drastically reduces the desired degree of cooperation amongst the mobile nodes. Over the course of time, the non-cooperative activities of, such selfish nodes would paralyze the normal functioning of the whole network. Therefore, these types of nodes should be detected and isolated from the network, as soon as they begin to exhibit their selfish behaviour. In this paper, a dynamic trust based intrusion detection technique is presented to detect and isolate the selfish nodes from the network, where the direct trust degree based on direct communication interactions and indirect (recommended) trust degree based on the neighbours' recommendations are taking into account to accurately judge the selfishness nature of the nodes. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed intrusion detection technique.
引用
收藏
页码:2029 / 2052
页数:24
相关论文
共 49 条
[1]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[2]  
[Anonymous], IET INT C WIR MOB MU
[3]  
Basu P, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P196
[4]   Stimulating cooperation in self-organizing mobile ad hoc networks [J].
Buttyán, L ;
Hubaux, JP .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) :579-592
[5]   A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network [J].
Chakrabarti, Chandrima ;
Banerjee, Ananya ;
Chakrabarti, Sanchari ;
Chakraborty, Angana .
COMPUTATIONAL ADVANCEMENT IN COMMUNICATION CIRCUITS AND SYSTEMS, ICCACCS 2014, 2015, 335 :279-289
[6]  
Chen CL, 2007, LECT NOTES COMPUT SC, V4809, P321
[7]   A Dynamic Reputation Management System for Mobile Ad Hoc Networks [J].
Chiejina, Eric ;
Xiao, Hannan ;
Christianson, Bruce .
COMPUTERS, 2015, 4 (02) :87-112
[8]  
Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1
[9]   On the tradeoff between altruism and selfishness in MANET trust management [J].
Cho, Jin-Hee ;
Chen, Ing-Ray .
AD HOC NETWORKS, 2013, 11 (08) :2217-2234
[10]   Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory [J].
Das, Debjit ;
Majumder, Koushik ;
Dasgupta, Anurag .
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 :92-101