Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy

被引:0
|
作者
Muhammad Saleem Khan
Daniele Midi
Saif-Ur-Rehman Malik
Majid I. Khan
Nadeem Javaid
Elisa Bertino
机构
[1] COMSATS Institute of Information Technology,Department of Computer Science
[2] Purdue University,Department of Computer Science
来源
关键词
MANETs; Threshold computation; Adaptive threshold; Static threshold; Colluding attackers;
D O I
暂无
中图分类号
学科分类号
摘要
Due to dynamic network topology, distributed architecture and absence of a centralized authority, Mobile Ad hoc Networks (MANETs) are vulnerable to various attacks from misbehaving nodes. To enhance the security of MANETs, various trust-based schemes have been proposed that augment the traditional cryptography-based security schemes. However, most of these schemes use static and predefined trust thresholds for node misbehavior detection, without taking into consideration the network conditions locally at each node. Using static trust thresholds for misbehavior detection may result in high false positives, low malicious node detection rate, and network partitioning. In this paper, we propose a novel Adaptive Trust Threshold (ATT) strategy that adapts the trust threshold in the routing protocol according to the network conditions such as rate of link changes, node degree and connectivity, and average neighborhood trustworthiness. We identify the topology factors that affect the trust threshold at each node, and leverage them to build a mathematical model for ATT computation. We compare our ATT strategy with one of the most recently proposed trust-based security schemes. Our simulation results indicate that the ATT strategy is robust in terms of convergence to the same trust threshold value computed at all neighbor nodes for malicious nodes and is energy efficient. Moreover, the ATT strategy achieves significant improvements in packet delivery ratio, reduction in false positives, and increase in detection rate as compared to non-ATT schemes (static trust threshold based schemes).
引用
收藏
页码:493 / 509
页数:16
相关论文
共 50 条
  • [1] Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy
    Khan, Muhammad Saleem
    Midi, Daniele
    Malik, Saif-Ur-Rehman
    Khan, Majid I.
    Javaid, Nadeem
    Bertino, Elisa
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 493 - 509
  • [2] Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation
    Khan, Muhammad Saleem
    Midi, Daniele
    Khan, Majid. I.
    Bertino, Elisa
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 718 - 725
  • [3] Video transmission enhancement in presence of misbehaving nodes in MANETs
    Tarek Sheltami
    Anas Al-Roubaiey
    Elhadi Shakshuki
    Ashraf Mahmoud
    Multimedia Systems, 2009, 15 : 273 - 282
  • [4] A Collaborative Reputation Approach to Avoid Misbehaving Nodes in MANETs
    Shurman, Mohammad
    Alfawares, Mohammad
    Al-Mistarihi, Mamoun F.
    Darabkh, Khalid A.
    2014 11TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2014,
  • [5] Video transmission enhancement in presence of misbehaving nodes in MANETs
    Sheltami, Tarek
    Al-Roubaiey, Anas
    Shakshuki, Elhadi
    Mahmoud, Ashraf
    MULTIMEDIA SYSTEMS, 2009, 15 (05) : 273 - 282
  • [6] A Vote Based System to Detect Misbehaving Nodes in MANETs
    Talreja, Rahul
    Jethani, Vimla
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 391 - 394
  • [7] Cack—a counter based authenticated ack to mitigate misbehaving nodes from manets
    Atheeq C.
    Rabbani M.M.A.
    Recent Advances in Computer Science and Communications, 2021, 14 (03) : 837 - 847
  • [8] Trust Variable Factor : A Trust based method to detect Misbehaving Nodes in MANET
    Talreja, Rahul
    Sathish, SriPradha
    Nenwani, Kamlesh
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3238 - 3241
  • [9] DETECTING MISBEHAVIOR NODES AND TRUST LEVELS IN MANETS
    Manchikalapudi, Varun
    Yelisetti, Sandeep
    Surapaneni, RaviKishan
    2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA), 2012,
  • [10] Implementation of Reputation Based Framework for Detecting Misbehaving Nodes and Illustration of Vampire Attack in Manets
    Sheikh, Hasansab
    Geetha, V
    Hariprasad, S. A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 861 - 869