MANET security through a distributed policy-based evaluation of node behaviour

While MANETs can provide seamless networking that is fast and easy to deploy, the lack of a stable topology, no centralized control, and the use of wireless links with limited bandwidth make MANETs highly vulnerable to attacks. The autonomy of individual nodes must be balanced with the need to ensure that nodes contribute to the network function as a whole. Trust-based systems are often proposed in this situation, but the mechanisms by which trust are built is still an active area of research. In this paper we present a policy-based trust management framework that uses the observed behaviour of neighbouring MANET nodes to identify and react to attacks. The system uses policy rules to evaluate observed behaviour of neighbouring nodes and reputation values shared by peers. The calculated trust values are then sent to neighbours. The calculation of trust based on a combination of flexible policy rules and distributed evaluation is a novel approach and a significant contribution of the paper. A simulation-based evaluation of our framework based on a wormhole attack shows that the scheme is both scalable and robust.

[1]  Saadiah Yahya,et al.  Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[2]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[3]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[4]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[5]  Vijay Kumar Tripathi,et al.  A Survey of Network Layer attacks and Security Mechanisms and Solutions for Routing Protocols in MANET , 2013 .

[6]  Victor C. M. Leung,et al.  A trust and reputation management system for cloud and sensor networks integration , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Simone A. Ludwig,et al.  A cognitive trust-based approach for Web service discovery and selection , 2005, Third European Conference on Web Services (ECOWS'05).

[9]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[10]  P. Anitha,et al.  Detection and Prevention of Wormhole Attacks in Manets Using Path Tracing , 2012 .

[11]  Yuguang Fang,et al.  A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.

[12]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[13]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[14]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[15]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[16]  Stathes Hadjiefthymiades,et al.  Trust management in mobile ad hoc networks , 2014, 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks).

[17]  Nabendu Chaki,et al.  A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[18]  Diego Gambetta Can We Trust Trust , 2000 .

[19]  Licia Capra,et al.  Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.

[20]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[21]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.