A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks

A Mobile Adhoc Network (manet) is a coop- erative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination among nodes in a cooperative manet has in- duced in them a vulnerability to attacks due to issues like dynamically changing network topology, cooperative algo- rithms and lack of centralized monitoring point. We pro- pose a semi-distributed approach towards a reputation-based Intrusion Detection System (ids) that combines with the Dy- namic Source Routing (dsr) protocol for strengthening the defense of a manet. Our system inherits the features of rep- utation from human behavior, hence making the ids socially inspired. It has a semi-distributed architecture as the crit- ical observations of the system are neither spread globally nor restricted locally. The system assigns maximum prior- ity to self observation by nodes for updating any reputation parameters, thus avoiding the need of a trust relationship be- tween nodes. Our system is also unique in the sense that it features the concepts of Redemption and Fading with a ro- bust Path Manager and Monitor system. Simulation studies show that dsr fortied with our system outperforms normal dsr in terms of the packet delivery ratio and routing over- head even when up to half of nodes in the network behave as malicious. Various parameters introduced such as timing window size, reputation update values, congestion parameter and other thresholds have been optimized over several simu- lation runs. By combining the semi-distributed architecture and other design essentials like path manager, monitor mod- ule, redemption and fading concepts, our system proves to be robust enough to counter most common attacks in manets.

[1]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[2]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[3]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[4]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[6]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[7]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[10]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[11]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[12]  J. J. Garcia-Luna-Aceves,et al.  A routing protocol for packet radio networks , 1995, MobiCom '95.

[13]  Satish K. Tripathi,et al.  Signal stability-based adaptive routing (SSA) for ad hoc mobile networks , 1997, IEEE Wirel. Commun..

[14]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[16]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[17]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[18]  Chai-Keong Toh,et al.  A novel distributed routing protocol to support ad-hoc mobile computing , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.