An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs

How to achieve reliable routing has always been a major issue in the design of communication networks, among which mobile ad hoc networks (MANETs) possess the most adversarial networking environment due to the absence of fixed infrastructure, the nature of open transmission media and the dynamic network topology. These characteristics also make the design of routing protocols in MANETs become even more challenging. In this paper, we propose an evolutionary self-cooperative trust (ESCT) scheme that imitates human cognitive process and relies on trust-level information to prevent various routing disruption attacks. In this scheme, mobile nodes will exchange trust information and analyze received trust information based on their own cognitive judgment. Eventually, each node dynamically evolves its cognition to exclude malicious entities. The most attractive feature of ESCT is that they cannot compromise the system even if the internal attackers know how the security mechanism works. In this paper, we evaluate the performance of ESCT scheme under various routing disruption attack situations. Simulation results affirm that ESCT scheme promotes network scalability and ensures the routing effectiveness in the presence of routing disruption attackers in MANETs.

[1]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[2]  Sheng Zhong,et al.  Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach , 2011, IEEE Transactions on Vehicular Technology.

[3]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[4]  Kin K. Leung,et al.  A Trustworthiness-based QoS routing protocol for wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[5]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  Chris McDonald,et al.  Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .

[7]  Isaac Woungang,et al.  Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.

[8]  Patrick Seemann,et al.  Matrix Factorization Techniques for Recommender Systems , 2014 .

[9]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[10]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[11]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[12]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[13]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[14]  P. Venkata Krishna,et al.  A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks , 2011, The Journal of Supercomputing.

[15]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[16]  Jamal N. Al-Karaki,et al.  Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..

[17]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[18]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[19]  Ming Gu,et al.  Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.

[20]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[21]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[22]  K. J. Ray Liu,et al.  HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[23]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[24]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[25]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[26]  Yue Wu,et al.  Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.

[27]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[28]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[29]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.