An accurate and precise malicious node exclusion mechanism for ad hoc networks

被引:16
作者
Ferraz, Lyno Henrique G. [1 ]
Velloso, Pedro B. [2 ]
Duarte, Otto Carlos M. B. [1 ]
机构
[1] Univ Fed Rio de Janeiro, GTA, POLI COPPE, BR-21945972 Rio de Janeiro, RJ, Brazil
[2] Univ Fed Fluminense, IC, Niteroi, RJ, Brazil
关键词
MANET; Security; Access control; Trust model;
D O I
10.1016/j.adhoc.2014.03.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks are attractive due to the wireless communication, infrastructureless design, and the self-organized mobile nodes. These features, however, introduce vulnerabilities, since there are no centralized control elements and the communication depends on cooperation of nodes. We propose a robust and distributed access control mechanism based on a trust model to secure the network and stimulate cooperation by excluding misbehaving nodes from the network. The mechanism divides the access control responsibility into two contexts: local and global. The local context responsibility is the neighborhood watch to notify the global context about suspicious behavior. In its turn, the global context analyzes the received information and decides whether it punishes the suspicious node using a voting scheme. We model the exclusion mechanism and perform a parameter analysis. Simulation results prove that the combination of voting and trust schemes provides an accurate and precise classification and node exclusion mechanism, even though in scenarios of limited monitoring. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:142 / 155
页数:14
相关论文
共 19 条
[1]   A localized certificate revocation scheme for mobile ad hoc networks [J].
Arboit, Genevieve ;
Crepeau, Claude ;
Davis, Carlton R. ;
Maheswaran, Muthucumaru .
AD HOC NETWORKS, 2008, 6 (01) :17-31
[2]   Stimulating cooperation in self-organizing mobile ad hoc networks [J].
Buttyán, L ;
Hubaux, JP .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) :579-592
[3]  
Fernandes N.C., 2009, IEEE INFOCOM 09
[4]  
Fernandes NC, 2010, IEEE INFOCOM SER
[5]  
Galuba W, 2010, IEEE INFOCOM SER
[6]   Distributed detection of mobile malicious node attacks in wireless sensor networks [J].
Ho, Jun-Won ;
Wright, Matthew ;
Das, Sajal K. .
AD HOC NETWORKS, 2012, 10 (03) :512-523
[7]   Comparison of two routing metrics in OLSR on a grid based mesh network [J].
Johnson, David ;
Hancke, Gerhard .
AD HOC NETWORKS, 2009, 7 (02) :374-387
[8]   MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks [J].
Kim, Mihui ;
Iyer, Varagur Karthik Sriram ;
Ning, Peng .
AD HOC NETWORKS, 2012, 10 (03) :299-316
[9]  
Lai J., INFORM SCI, V181
[10]  
Laufer R.P., 2012, IEEE INFOCOM 12