INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.7, No.4, Jul. 2017

An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET

Full Text (PDF, 477KB), PP.28-37


Views:75   Downloads:3

Author(s)

Mohammed Azza, Sofiane Boukli Hacene

Index Terms

MANET;AODV;Misbehavior;reputation-based;Monitoring;NS2

Abstract

In this paper, we propose an enhanced approach based on first-hand reputation with allows to detected misbehavior node in Manet. The network's security is an important challenge in this kind of networks. The main objective of the misbehaving nodes in AODV routing protocol deletes all data packets that received thus, don’t transmit to their destination. In a reputation-based system, each node overhears the activity of its neighbors (transmit and receive) in first-hand or combined with second-hand. Our approach is composed of three-phase directly monitoring, calculating reputation value and node isolation. The reputation value is enhanced by the packet dropped due to other events such as overloading of queue and node availability. The node with a negative reputation will be isolated, and an alert packet will be distributed to neighboring nodes to inform, afterwards an improved local repair is started. The simulation results show that the proposed approach can detect and isolate a malicious node, which improves the packet delivery ratio and lowest increasing in the throughput, while reducing the success rate of the misbehaving nodes. 

Cite This Paper

Mohammed Azza, Sofiane Boukli Hacene,"An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.7, No.4, pp.28-37, 2017.DOI: 10.5815/ijwmt.2017.04.03

Reference

[1]Kannhavong, B., et al., A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 2007. 14(5): p. 85-91.

[2]Junhai, L., et al., A survey of multicast routing protocols for mobile ad-hoc networks. IEEE communications surveys & tutorials, 2009. 11(1): p. 78-91.

[3]Kumar, J., M. Kulkarni, and D. Gupta, Effect of Black hole Attack on MANET routing protocols. International Journal of Computer Network and Information Security, 2013. 5(5): p. 64.

[4]Bibhu, V., et al., Performance Analysis of black hole attack in VANET. International Journal Of Computer Network and Information Security, 2012. 4(11): p. 47.

[5]Subramaniyan, S., W. Johnson, and K. Subramaniyan, A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 2014. 2014(1): p.1

[6]Liu, J. and V. Issarny. Enhanced reputation mechanism for mobile ad hoc networks. in International Conference on Trust Management. 2004. Springer.

[7]Liu, K., et al., An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE transactions on Mobile Computing, 2007. 6(5): p. 536-550.

[8]Joseph, C., et al., Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios. Indian Journal of Science and Technology, 2015. 8(29).

[9]Dini, G. and A.L. Duca, Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks, 2012. 10(7): p. 1167-1178.

[10]Akhtar, A.K. and G. Sahoo, Classification of Selfish and Regular Nodes Based on Reputation Values in MANET Using Adaptive Decision Boundary. Communications and Network, 2013. Vol.05No.03: p. 7.

[11]Perkins, C., E. Belding-Royer, and S. Das, Ad hoc on-demand distance vector (AODV) routing. 2003.

[12]Wang, F., et al., COSR: a reputation-based secure route protocol in MANET. EURASIP J. Wirel. Commun. Netw., 2010. 2010: p. 1-13.

[13]Han, G., et al., Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 2014. 80(3): p. 602-617.

[14]Bansal, S. and M. Baker, Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012, 2003.

[15]Buchegger, S. and J.-Y. Le Boudec. Performance analysis of the CONFIDANT protocol. in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. 2002. ACM.

[16]Marti, S., et al. Mitigating routing misbehavior in mobile ad hoc networks. in Proceedings of the 6th annual international conference on Mobile computing and networking. 2000. ACM.

[17]Michiardi, P. and R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced communications and multimedia security. 2002, Springer. p. 107-121.

[18]Ayday, E. and F. Fekri. BP-P2P: Belief propagation-based trust and reputation management for P2P networks. in Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 9th Annual IEEE Communications Society Conference on. 2012. IEEE.

[19]Patel, A.D. and R.H. Jhaveri, Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs. International Journal of Computer Network & Information Security, 2016. 8(5).