A reputation-based scheme against malicious packet dropping for mobile ad hoc networks

A mobile ad hoc network (MANET) operates much depending on node's willingness to cooperate in the network. A node's misbehavior can have severe impact in overall network performance. One of the different kinds of misbehavior a node may exhibit is malicious packet dropping. In this paper, we focus on detecting and excluding nodes that misbehave by dropping some or all packets forwarded through them. We propose a reputation-based scheme for efficiently solving the problem. The proposed scheme use both self-observation and second-hand information to establish comprehensive reputation of a node. Nodes with bad comprehensive reputation will be excluded from the network. History reputation is also taken into account to providing indeliberate faults tolerance. Furthermore, we use fuzzy analysis to deal with the imprecision based on the fact that the cause of packet dropping can be heterogeneous and therefore improve the performance without imposing a high computational burden.

[1]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[2]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[3]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[4]  Mike Burmester,et al.  Cooperation in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[5]  Jon Crowcroft,et al.  Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.

[6]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[7]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[8]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Yuan Ning Securing AD-HOC networks using IPSec , 2006 .

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[13]  Jamal N. Al-Karaki,et al.  Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..

[14]  Evangelos Kranakis,et al.  Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.

[15]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[16]  Zhang Xiaoning and Feng Dengguo Intrusion Detection for Ad Hoc Routing Based on Fuzzy Behavior Analysis , 2006 .

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..