Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks

被引:35
作者
Jhaveri, Rutvij H. [1 ]
Patel, Narendra M. [2 ]
机构
[1] CHARUSAT Univ, Dept Comp Engn, CSPIT, Changa 388421, Gujarat, India
[2] Birla Vishvakarma Mahavidyalaya, Dept Comp Engn, Vv Nagar 388120, Gujarat, India
关键词
packet forwarding misbehavior; secure routing; trust model; attack pattern discovery; method of common differences; mobile ad-hoc networks; AODV;
D O I
10.1002/dac.3148
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multi-hop routing in an open environment in the absence of well-established infrastructure and centralized authority strives for trustworthiness and cooperation of nodes in a Mobile Ad-hoc Network (MANET). There is no guarantee of secure and reliable delivery of packets when some internal nodes intentionally perform packet forwarding misbehavior by compromising the routing mechanism. In this paper, we address this issue with a trust-model integrated with an attack pattern discovery technique. Extended from the Ad-hoc On-demand Distance Vector (AODV) routing protocol, we propose a trust-based scheme founded on nodes' historical behaviors which adopts a pattern discovery mechanism in order to detect suspicious activities from the malevolent nodes before they start dropping data packets. We also present the detailed mode of operations of three distinct adversary models launching various kinds of packet forwarding misbehavior. Theoretical analysis and experimental results prove that the integration of a pattern discovery method with a trust-based model provides earlier detection of adversaries which follow specific attack patterns and weakens their damaging effects on the network in comparison to a solitary trust-based model. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页数:24
相关论文
共 24 条
[1]  
[Anonymous], EURASIP J WIRELESS C
[2]  
Ayachi Mohamed Ali, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P802, DOI 10.1109/CSE.2009.125
[3]  
Bansal M., 1999, MOBILE AD HOC NETWOR
[4]   Topological comparison-based wormhole detection for MANET [J].
Chan, King Sun ;
Alam, Mohammad Rafiqul .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (07) :1051-1068
[5]  
Chang Elizabeth J., 2005, SWS'05: Proceedings of the 2005 workshop on Secure web services, P75
[6]   Trust management in mobile ad hoc networks for bias minimization and application performance maximization [J].
Chen, Ing-Ray ;
Guo, Jia ;
Sao, Fenye ;
Cho, Jin-Hee .
AD HOC NETWORKS, 2014, 19 :59-74
[7]  
Cheng WF, 2006, LECT NOTES COMPUT SC, V4138, P478
[8]  
Griffiths N, 2008, STUD COMPUT INTELL, V162, P105
[9]  
Jensen CD, 2006, LECT NOTES COMPUT SC, V3986, P150
[10]  
Jhaveri Rutvij H., 2013, Dynamic Ad hoc Networks, P261, DOI 10.1049/PBTE059E_ch12