An efficient layered security framework for protecting network layer operations in mobile ad hoc networks

被引:1
作者
Jaisankar, N. [1 ]
Saravanan, R. [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
mobile ad hoc network; MANET; mobile agents; malicious nodes; routing; network-layer security; packet forwarding; routing protocols; truthfulness rate; public key; false alarm rate;
D O I
10.1504/IJCNDS.2010.034950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks, the nodes are dynamically changing and they have a fully decentralised topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmission medium. We proposed a novel agent-based framework to monitor, detect and isolate misbehaving nodes in the MANET. The proposed framework protect both routing and data forwarding operations, which aiming to improve the efficiency in detecting and isolating misbehaving nodes with a minimum overhead. In this paper, local neighbouring nodes collaboratively monitor and sustain each other. A novel truthfulness rate strategy is introduced in each node to determine the well-behaving nodes. We evaluate through network simulations the effectiveness of the framework in detecting malicious nodes and improving the network performance.
引用
收藏
页码:295 / 307
页数:13
相关论文
共 13 条
  • [1] Buchegger S., 2002, P 3 ACM INT S MOB AD, P226, DOI DOI 10.1145/513800.513828
  • [2] Buttyan L., 2002, ACM J MOBILE NETWORK
  • [3] Chatterjee M, 2002, IEEE INFOCOM SER, P400, DOI 10.1109/INFCOM.2002.1019282
  • [4] Djenouri D., 2009, AD HOC NETWORKS
  • [5] SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    Hu, YC
    Johnson, DB
    Perrig, A
    [J]. FOURTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2002, : 3 - 13
  • [6] Hubaux J.-P., 2001, MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, P146, DOI 10.1145/501416.501437
  • [7] Jaisankar N., 2003, NAT C INN COMM TECHN
  • [8] Kong JJ, 2001, NETWORK PROTOCOLS, P251, DOI 10.1109/ICNP.2001.992905
  • [9] An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    Liu, Kejun
    Deng, Jing
    Varshney, Pramod K.
    Balakrishnan, Kashyap
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (05) : 488 - 502
  • [10] Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955