Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs

2010 ◽  
pp. 1488-1505
Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.

Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.


Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Abdulfattah Noorwali ◽  
Ahmad Naseem Alvi ◽  
Mohammad Zubair Khan ◽  
Muhammad Awais Javed ◽  
Wadii Boulila ◽  
...  

Wireless sensor network (WSN) is an integral part of Internet of Things (IoT). The sensor nodes in WSN generate large sensing data which is disseminated to intelligent servers using multiple wireless networks. This large data is prone to attacks from malicious nodes which become part of the network, and it is difficult to find these adversaries. The work in this paper presents a mechanism to detect adversaries for the IEEE 802.15.4 standard which is a central medium access protocol used in WSN-based IoT applications. The collisions and exhaustion attacks are detected based on a soft decision-based algorithm. In case the QoS of the network is compromised due to large data traffic, the proposed protocol adaptively varies the duty cycle of the IEEE 802.15.4. Simulation results show that the proposed intrusion detection and adaptive duty cycle algorithm improves the energy efficiency of a WSN with a reduced network delay.


2013 ◽  
Vol 347-350 ◽  
pp. 2463-2467 ◽  
Author(s):  
Jing Pei Wang ◽  
Sun Bin ◽  
Yang Yu ◽  
Xin Xin Niu

Trust management provides a potential solution for the security issues of distributed networks. However, there are rare researches about the trust mechanism for IoT in the literature. A new distributed trust management mechanism for IoT is established in this paper. Firstly, we extract three basic elements-service, decision-making and self-organizing, of trust management from the investigated trust solutions. Then, based on a service model, we establish a trust management frame-work for the layered IoT, which is decomposed into three layers: sensor layer, core layer and application layer. Finally, we use fuzzy set theory and formal semantics-based language to perform the layered trust mechanism. The proposed trust conception, layered service model and formal method provide a general framework for the study of trust management for the IoT, and further provide a significant reference for the development of sound trust models for IoT.


The Routing protocol for low power lossy networks (RPL) was evolved by IETF by considering various conditions of constrained networks. This protocol was aimed in order to encourage several routing topologies known DODAGs which were built under different objective functions to improve the routing using different routing measures. There were billions of devices which were connected all over the world because of which the security is the major concern of routing in IoT devices, where different attacks takes place during the routing. Variety of attacks happens while routing, some on network topology others on network traffic and some other attacks on network resources. This paper studies about resource based attacks which targets at consuming the energy of node, memory, processing power by making malicious nodes to perform unnecessary processing actions and these attacks also effect the network availability and reduce the lifetime of the topology. This paper introduces an allied nodes follow up technique where some allied nodes are staked in the DODAG topology in order to detect the resource based attacks in RPL like version number, neighbour, worst parent, rank attacks. These allied nodes follow up and monitors each and every node and based on proposed constraints not only detects these resource attacks in RPL and also updates the information to the root node about malicious node in order to eradicate it from DODAG. The performance of proposed model was compared with previous attack detection models regarding to the measures like packet delivery ratio, end to end delay and throughput.


Author(s):  
Sandeep Kumar Arora ◽  
Gulshan Kumar ◽  
Tai-hoon Kim

Blockchain is the consensus-based technology to resolve the conflicts in Byzantine environments. Vehicles validate the messages received from the neighboring vehicles using Gradient Boosting Technique (GBT). Based on the validation results the message source vehicle generates the ratings that are to be uploaded to Road Side Units (RSUs) through that trust offset value can be calculated. All RSUs maintain the trust blockchain and each RSU tries to add their blocks to trust blockchain. We proposed a blockchain-based trust management model for VANET based on Tendermint. It eliminates the problem of malicious nodes entering the network and will also overcome the problem of power consumption. Simulation results also show that the proposed system is 7.8% and 15.6% effective and efficient in terms of Packet Delivery Ratio (PDR) and End-to-End Delay (EED) respectively to collect the trusted data between the vehicles.


Author(s):  
Gurpreet Singh, Ganpat Joshi

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.


Author(s):  
Mohamed Hadded ◽  
Khalifa Toumi ◽  
Anis Laouiti ◽  
Paul Muhlethaler

Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructure. These applications need a reliable and secure broadcast system that takes into consideration the security issues in VANETs, the high speed of nodes, and the strict QoS requirements. For these reasons, the authors propose a trust-based and centralized TDMA-based MAC protocol that avoids time slot assignment to malicious nodes and minimizes message collision. The solution is based on the design of a generic trust mechanism for VANETs based on the MAC requirements and its integration into a centralized TDMA-based MAC protocol, named trust-CTMAC. The mechanism will permit roadside units (RSUs) to manage trust level assignment via security check during free slot allotment. The experiments carried out and the results obtained prove the effectiveness of the approach.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 22
Author(s):  
A Aranganathan ◽  
C D. Suriyakala

Intrusion detection is one of challenging issues in wireless networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based Mobile ad hoc network environment. The model comprises of mobile agents, which are used to detect intrusions, respond to intrusions, mainly preventing the routing attacks while securing them and distributing selected and aggregated intrusion information to all other nodes in the network in an intelligent manner to compensate the attack. The model is simulated to test its operation effectiveness by considering various performance parameters such as, packet delivery ratio, communication overhead, throughput. It implements a secure detection and prevention technique that contains the Blowfish algorithm which is a symmetric encryption and decryption algorithm having a secure standard till date against attacks to make the network transmission secure while monitoring malicious nodes and preventing them from compromising the integrity of the network. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, and flexibility. 


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Fengyin Li ◽  
Dongfeng Wang ◽  
Yilei Wang ◽  
Xiaomei Yu ◽  
Nan Wu ◽  
...  

The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to close cooperation between electronic devices. It requires strong reliability and trustworthiness of the devices involved in the communication. However, current trust mechanisms have the following issues: (1) heavily relying on a trusted third party, which may incur severe security issues if it is corrupted, and (2) malicious evaluations on the involved devices which may bias the trustrank of the devices. By introducing the concepts of risk management and blockchain into the trust mechanism, we here propose a blockchain-based trust mechanism for distributed IoT devices in this paper. In the proposed trust mechanism, trustrank is quantified by normative trust and risk measures, and a new storage structure is designed for the domain administration manager to identify and delete the malicious evaluations of the devices. Evidence shows that the proposed trust mechanism can ensure data sharing and integrity, in addition to its resistance against malicious attacks to the IoT devices.


Sign in / Sign up

Export Citation Format

Share Document