An accurate and precise malicious node exclusion mechanism for ad hoc networks

被引:16
作者
Ferraz, Lyno Henrique G. [1 ]
Velloso, Pedro B. [2 ]
Duarte, Otto Carlos M. B. [1 ]
机构
[1] Univ Fed Rio de Janeiro, GTA, POLI COPPE, BR-21945972 Rio de Janeiro, RJ, Brazil
[2] Univ Fed Fluminense, IC, Niteroi, RJ, Brazil
关键词
MANET; Security; Access control; Trust model;
D O I
10.1016/j.adhoc.2014.03.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks are attractive due to the wireless communication, infrastructureless design, and the self-organized mobile nodes. These features, however, introduce vulnerabilities, since there are no centralized control elements and the communication depends on cooperation of nodes. We propose a robust and distributed access control mechanism based on a trust model to secure the network and stimulate cooperation by excluding misbehaving nodes from the network. The mechanism divides the access control responsibility into two contexts: local and global. The local context responsibility is the neighborhood watch to notify the global context about suspicious behavior. In its turn, the global context analyzes the received information and decides whether it punishes the suspicious node using a voting scheme. We model the exclusion mechanism and perform a parameter analysis. Simulation results prove that the combination of voting and trust schemes provides an accurate and precise classification and node exclusion mechanism, even though in scenarios of limited monitoring. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:142 / 155
页数:14
相关论文
共 19 条
[11]  
Liu W., 2011, IEEE ICC 11
[12]   URSA: Ubiquitous and robust access control for mobile ad hoc networks [J].
Luo, HY ;
Kong, JJ ;
Zerfos, P ;
Lu, SW ;
Zhang, LX .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2004, 12 (06) :1049-1063
[13]   DICTATE: DIstributed cerTification authority with probabilisTic frEshness for ad hoc networks [J].
Luo, J ;
Hubaux, JP ;
Eugster, PT .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (04) :311-323
[14]  
Martignon F., 2009, ACM Q2SWINET 09
[15]   Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks [J].
Nikander, Pekka ;
Gurtov, Andrei ;
Henderson, Thomas R. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (02) :186-204
[16]   A cluster-based trust-aware routing protocol for mobile ad hoc networks [J].
Safa, Haidar ;
Artail, Hassan ;
Tabet, Diana .
WIRELESS NETWORKS, 2010, 16 (04) :969-984
[17]  
Sencun Zhu, 2006, Ad Hoc Networks, V4, P567, DOI 10.1016/j.adhoc.2005.06.002
[18]  
Song C., 2009, IEEE SECON 09
[19]  
Velloso Pedro B., 2010, IEEE Transactions on Network and Service Management, V7, P172, DOI 10.1109/TNSM.2010.1009.I9P0339