Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs

Instant collaborative group communication can be achieved by deploying Mobile Ad Hoc Networks (or MANETs) without any pre-plan and pre-existing infrastructure setup. However, the curbs thrown by these networks, motivate the necessity of a group key management framework to secure data traffic. In this context, significant research work done in the last decade and proved that the trust based frameworks deliver better performance than others. In MANETs, trust quantified as the belief held by a node about another node. It is evaluated based on the assessing node direct experiences with assessed node itself, if they are neighbors and recommendations from remote nodes in the network with which assessed node has a direct experience, if they are remote. However, the framework based on recommendations by other nodes in the network might ultimately lead to system failure due to the menace of unfair recommendations by selfish and malicious nodes. Lying and on-off attacks on the system are such type of attacks. This motivates us to work on a framework which is immune to aforesaid attacks and should be lightweight due to node's has limited computing resources. We propose a framework which scrutinizes dishonest recommendations based on the trust threshold value of remote nodes, distance from mean of trust recommendations and by maintaining a history of recommendations. Our simulation outcomes prove that proposed framework can deliver better network performance and resistance to lying and on-off attacks.

[1]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[2]  Sivakumar Ponnusamy,et al.  Mobile Agents based Reliable and Energy Efficient Routing Protocol for MANET , 2016 .

[3]  I. Awan,et al.  Trust Routing in MANET for Securing DSR Routing Protocol , 2010 .

[4]  Radhakrishnan Shanmugasundaram,et al.  Authentication in Wireless Sensor Networks Using Dynamic Keying Technique , 2016 .

[5]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[6]  Ruidong Li,et al.  On-demand public-key management for mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[7]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[8]  YuHua Yuan,et al.  An Optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) Routing Protocol , 2005, 2005 Asia-Pacific Conference on Communications.

[9]  K. Cook Trust in Society , 2001 .

[10]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[11]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[12]  Omar Cheikhrouhou,et al.  Secure Group Communication in Wireless Sensor Networks: A survey , 2016, J. Netw. Comput. Appl..

[13]  Guy Pujolle,et al.  An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[15]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[16]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[17]  Hamamache Kheddouci,et al.  ECGK: An efficient clustering scheme for group key management in MANETs , 2010, Comput. Commun..

[18]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[19]  Marcin Seredynski,et al.  Nature-Inspired Evaluation of Data Classes for Trust Management in MANETs , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[20]  Omar Cheikhrouhou,et al.  Secure Group communication in Wireless Sensor Networks , 2013 .

[21]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[22]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[23]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[24]  Kamal Kumar Chauhan,et al.  Securing Mobile Ad hoc Networks:Key Management and Routing , 2012, ArXiv.

[25]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[26]  Gianpiero Costantino,et al.  Managing Reputation over MANETs , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[27]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[28]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[29]  Lingling Li,et al.  A New Algorithm of Closeness Degree for Fuzzy Pattern Recognition , 2010 .