Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we propose a unified trust management scheme that enhances the security in MANETs. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation, which is also called secondhand information that is obtained from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory (DST), which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method. By combining these two components in the trust model, we can obtain more accurate trust values of the observed nodes in MANETs. We then evaluate our scheme under the scenario of MANET routing. Extensive simulation results show the effectiveness of the proposed scheme. Specifically, throughput and packet delivery ratio (PDR) can be improved significantly with slightly increased average end-to-end delay and overhead of messages.

[1]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[2]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[3]  Thomas H. Clausen,et al.  Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2) , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[4]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[5]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[6]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[7]  Jie Yang,et al.  Sensor Fusion Using Dempster-Shafer Theory , 2002 .

[8]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[9]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[10]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[11]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[12]  F. Richard Yu,et al.  Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.

[13]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[14]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[15]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[16]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[17]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[18]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..

[19]  Vincent W. S. Chan,et al.  The next 10 years of DOD wireless networking research , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[20]  Kenichi Mase,et al.  OLSRv2 implementation and performance evaluation with link layer feedback , 2007, IWCMC.

[21]  Ioannis Lambadaris,et al.  Trust establishment in cooperative wireless relaying networks , 2014, Wirel. Commun. Mob. Comput..

[22]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[23]  Irene Macaluso,et al.  Cognitive Radio Mobile Ad Hoc Networks , 2010 .

[24]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[25]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[26]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[27]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[28]  Jonathan Loo,et al.  Mobile Ad Hoc Networks: Current Status and Future Trends , 2011 .

[29]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .

[30]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[31]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[32]  Weisong Shi,et al.  Building a Trust-Aware dynamic routing solution for Wireless Sensor Networks , 2010, 2010 IEEE Globecom Workshops.

[33]  Yuguang Fang,et al.  Securing resource-constrained wireless ad hoc networks , 2007, 2007 IEEE Sarnoff Symposium.

[34]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[35]  Thomas H. Clausen,et al.  Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.

[36]  Yuguang Fang,et al.  AOS: an anonymous overlay system for mobile ad hoc networks , 2011, Wirel. Networks.

[37]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[38]  Thomas Clausen,et al.  Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .

[39]  Glenn Shafer,et al.  Readings in Uncertain Reasoning , 1990 .

[40]  Philippe Jacquet,et al.  Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .

[41]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[42]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[43]  Ioannis Lambadaris,et al.  Trust establishment in cooperative wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[44]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[45]  F. Richard Yu,et al.  Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..

[46]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.