A Prototype for Global Trust Management in Mobile Ambient Home Network

Author(s):  
S.A. Akinboro ◽  
E.A. Olajubu ◽  
I.K. Ogundoyin ◽  
G.A. Aderounmu

This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was implemented using C# programming language. The framework will enhance the activities in the home by securing the home network against unforeseen network disruption and node misbehavior due to the distributed nature of the environment.

Author(s):  
Akinboro Solomon ◽  
Emmanuel Olajubu ◽  
Ibrahim Ogundoyin ◽  
Ganiyu Aderounmu

This study designed, simulated and evaluated the performance of a conceptual framework for ambient ad hoc home network. This was with a view to detecting malicious nodes and securing the home devices against attacks. The proposed framework, called mobile ambient social trust consists of mobile devices and mobile ad hoc network as communication channel. The trust model for the device attacks is Adaptive Neuro Fuzzy (ANF) that considered global reputation of the direct and indirect communication of home devices and remote devices. The model was simulated using Matlab 7.0. In the simulation, NSL-KDD dataset was used as input packets, the artificial neural network for packet classification and ANF system for the global trust computation. The proposed model was benchmarked with an existing Eigen Trust (ET) model using detection accuracy and convergence time as performance metrics. The simulation results using the above parameters revealed a better performance of the ANF over ET model. The framework will secure the home network against unforeseen network disruption and node misbehavior.


2017 ◽  
Author(s):  
Isha Bhan

Mobile ad-hoc networks (MANET) are a primary requirement for the establishment of communication. CBDS has a reverse tracking mechanism which checks all the stated issues. CBDS outperforms among nodes. The malicious nodes may lead to security concerns such as it may disrupt the routing process. Since it is a Manet, it can change its scale anytime so preventing or detecting the malicious node becomes a challenge. This paper tries to solve the issue by applying a dynamic source route mechanism which is also referred as cooperative bait detection scheme (CBDS). CBDS technique integrates the advantage of both proactive and reactive mechanisms much better than the previous mechanisms like BFTR, 2ACK.


Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


2014 ◽  
Vol 644-650 ◽  
pp. 2838-2841
Author(s):  
Ping Zong ◽  
Jun Qin

With the growth of multimedia business demand in commercial applications, providing QoS support in Ad Hoc network is more and more important. With the appearance of the business which has strict requirements on the QoS, to provide QoS guarantee in mobile Ad Hoc network will have more important significance. By researching the QoS guarantee mechanism research status of wireless Ad Hoc network, as well as the existing research results and the analysis of the problems remaining to be solved, this paper puts forward a new QoS routing protocol named ProDSR, which adds QoS guarantee mechanism extension to the dynamic source routing protocol (DSR). This protocol makes bandwidth, stability and hop count to be selection criteria for providing QoS guarantee, effectively improves the service quality of mobile Ad Hoc network.


Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


Sign in / Sign up

Export Citation Format

Share Document