ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks

Distributed wireless networks have become popular due to the evolution of the Internet-of-Things. These networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes on the basis of network connectivity and a set of conventions that is determined by the routing protocol. Still, these protocols fail to protect legitimate nodes against several types of selfish and malicious activity. Thus, trust and reputation schemes are integrated with pure routing protocols to provide secure routing functionality. In this paper we propose ModConTR - a modular and adaptable trust and reputation-based system for secure routing. The system is composed of 11 different components which can be configured at runtime to adjust to each application's security and performance requirements. Presented work includes three possible configurations of ModConTR, considering ultra-lightweight, low-cost and lightweight implementations. Moreover, predefined configurations permit the implementation of the reasoning process for well-known secure routing protocols. Thus, we present a security and performance analysis for each of the components, including a comparative analysis of 10 complete trust and reputation schemes under identical attack scenarios. ModConTR is implemented using the NS2 simulator and is integrated with the DSR routing protocol.

[1]  H K Sawant,et al.  Collaborative Trust-based Secure Routing based Ad-hoc Routing , 2012 .

[2]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[3]  Li Xu,et al.  A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks , 2008, J. Commun..

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[6]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[7]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[8]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[9]  Sugata Sanyal,et al.  A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks , 2010, ArXiv.

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[11]  S. Singh,et al.  Routing Protocols in Wireless Sensor Networks - A Survey , 2010 .

[12]  Tai Hoon Kim,et al.  An Intelligent Distributed Reputation Based Mobile Intrusion Detection System , 2011 .

[13]  Charalampos Manifavas,et al.  Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems , 2012, 2012 16th Panhellenic Conference on Informatics.

[14]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .