Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy

被引:0
|
作者
Muhammad Saleem Khan
Daniele Midi
Saif-Ur-Rehman Malik
Majid I. Khan
Nadeem Javaid
Elisa Bertino
机构
[1] COMSATS Institute of Information Technology,Department of Computer Science
[2] Purdue University,Department of Computer Science
来源
关键词
MANETs; Threshold computation; Adaptive threshold; Static threshold; Colluding attackers;
D O I
暂无
中图分类号
学科分类号
摘要
Due to dynamic network topology, distributed architecture and absence of a centralized authority, Mobile Ad hoc Networks (MANETs) are vulnerable to various attacks from misbehaving nodes. To enhance the security of MANETs, various trust-based schemes have been proposed that augment the traditional cryptography-based security schemes. However, most of these schemes use static and predefined trust thresholds for node misbehavior detection, without taking into consideration the network conditions locally at each node. Using static trust thresholds for misbehavior detection may result in high false positives, low malicious node detection rate, and network partitioning. In this paper, we propose a novel Adaptive Trust Threshold (ATT) strategy that adapts the trust threshold in the routing protocol according to the network conditions such as rate of link changes, node degree and connectivity, and average neighborhood trustworthiness. We identify the topology factors that affect the trust threshold at each node, and leverage them to build a mathematical model for ATT computation. We compare our ATT strategy with one of the most recently proposed trust-based security schemes. Our simulation results indicate that the ATT strategy is robust in terms of convergence to the same trust threshold value computed at all neighbor nodes for malicious nodes and is energy efficient. Moreover, the ATT strategy achieves significant improvements in packet delivery ratio, reduction in false positives, and increase in detection rate as compared to non-ATT schemes (static trust threshold based schemes).
引用
收藏
页码:493 / 509
页数:16
相关论文
共 50 条
  • [31] Detection of the Vehicle Direction with Adaptive Threshold Algorithm Using Magnetic Sensor Nodes
    Vancin, Sercan
    Erdem, Ebubekir
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2018, 21 (02): : 333 - 340
  • [32] Detection of Intelligent Malicious and Selfish Nodes in VANET using Threshold Adaptive Control
    Kerrache, Chaker Abdelaziz
    Lakas, Abderrahmane
    Lagraa, Nasreddine
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,
  • [33] A Dynamic Load Balancing Strategy with Adaptive Threshold Based Approach
    Alam, Taj
    Raza, Zahid
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 927 - 932
  • [34] Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication using Sensor Trust
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 554 - 561
  • [35] Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing
    Xie, Gang
    Zhou, Xincheng
    Gao, Jinchun
    SENSORS, 2023, 23 (10)
  • [36] An Adaptive Trust Evaluation Model for Detecting Abnormal Nodes in Underwater Acoustic Sensor Networks
    Liu, Changtao
    Ye, Jun
    An, Fanglin
    Jiang, Weili
    SENSORS, 2024, 24 (09)
  • [37] Investigation of the Multimedia Adaptive Threshold Strategy for Mobile Integrated Services Networks
    Persone, Vittoria de Nitto
    Pillekeit, Andreas
    Iacari, Matte
    MEASUREMENT, MODELLING, AND EVALUATION OF COMPUTING SYSTEMS AND DEPENDABILITY AND FAULT TOLERANCE, 2010, 5987 : 151 - +
  • [38] An adaptive threshold-based call admission strategy for wireless networks
    Lombardo, A
    Morabito, G
    Palazzo, S
    Schembra, G
    1999 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 1999, : 423 - 427
  • [39] Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks
    Li, Yuanjie
    Xu, Hongyun
    Cao, Qiying
    Li, Zichuan
    Shen, Shigen
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [40] Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks
    College of Information Science and Technology, Donghua University, Shanghai
    201620, China
    不详
    201620, China
    不详
    201620, China
    不详
    312000, China
    不详
    314001, China
    Int. J. Distrib. Sens. Netw.,