Possibility and Necessity Measures to Enhance Reliability and Cooperation in MANETS

Ensuring security in Mobile Ad hoc Network (MANET) is a major concern. The majority of attacks can be prevented by secure routing protocol, but non-cooperation still suffers from a serious drawback which is the total strength of nodes in a network. A lot of solution to enforce cooperation has been proposed in the literature which isolate nodes directly on the basis of lesser reputation values but reduces the total strength of nodes in a network. Finally, the lesser strength of nodes degrades the performance and reliability of mobile ad hoc networks. To enforce cooperation in MANET this work presents the Perfect Evidence (PE) model which uses reputation value to obtain the possibility and necessity measures and isolate a node having perfect evidence. It involves nesting of focal element to know the perfect evidence. The proposed model enhances performance of the network because it eliminates only one misbehaving node in each turn, which maintains the total strength of nodes in a network. In addition to that it enhances cooperation in network because it identifies and isolates the most misbehaving node and warns other misbehaved nodes. The warning message suggests other misbehaving nodes to cooperate in network activities otherwise at any turn it will be isolated from the network. Experimental result shows the efficiency of the model.

[1]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[2]  Juan-Carlos Cano,et al.  Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog , 2012, IEEE Communications Letters.

[3]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[4]  Tanapat Anusas-amornkul On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks , 2008 .

[5]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[6]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[7]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[8]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[9]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[10]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[11]  Laurence Tianruo Yang,et al.  Fuzzy Logic with Engineering Applications , 1999 .

[12]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[13]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[14]  George J. Klir,et al.  Fuzzy sets, uncertainty and information , 1988 .

[15]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[16]  Juan-Carlos Cano,et al.  Evaluation of collaborative selfish node detection in MANETS and DTNs , 2012, MSWiM '12.

[17]  Panagiotis Papadimitratos,et al.  The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .

[18]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[19]  Benxiong Huang,et al.  COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..

[20]  Milena Radenkovic,et al.  Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[21]  N. H. Saeed,et al.  Intelligent Manet Optimisation System , 2012 .

[22]  Turgay Korkmaz,et al.  Enhancing role-based trust management with a reputation system for MANETs , 2011, EURASIP J. Wirel. Commun. Netw..

[23]  Maysam F. Abbod,et al.  IMAN: An Intelligent MANET routing system , 2010, 2010 17th International Conference on Telecommunications.

[24]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[25]  Chun-Ta Li,et al.  A secure routing protocol with node selfishness resistance in MANETs , 2012, Int. J. Mob. Commun..