Reliable operational services in MANETs by misbehavior-tolerant quorum systems

Operational services in MANETs, such as resource location and distribution of connectivity information, deal with node mobility and resource constraints to support applications. The reliability and availability of these services can be assured by data management approaches, as replication techniques using quorum systems. However, these systems are vulnerable to selfish and malicious nodes, that intentionally do not collaborate with replication operations or spread malicious data while participating in data replication. QS2, a bio-inspired scheme to tolerate selfish and malicious nodes in replication operation of quorum systems can effectively detect misbehaving nodes in quorum systems, increasing data reliability. This paper evaluates the performance of QS2 considering two realistic scenarios: the distribution of local market information in a downtown city and the distribution of traffic and schedule information in bus lines. Simulation results show that QS2 improves the reliability of replicated data in MANETs and the amount of data compromised by misbehaving nodes inside the replication system is much lower than outdated data due to network topology.

[1]  Michele Nogueira Lima,et al.  Implications of misbehaving attacks on probabilistic quorum system for MANETs , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[2]  Sneha Kumar Kasera,et al.  Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[3]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[4]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[5]  Patrick Th. Eugster,et al.  PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems , 2003, MobiHoc '03.

[6]  Michele Nogueira Lima,et al.  A bio-inspired scheme on quorum systems for reliable services data management in MANETs , 2012, 2012 IEEE Network Operations and Management Symposium.

[7]  João Leitão,et al.  Epidemic Broadcast Trees , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[8]  Avishai Wool,et al.  Probabilistic Byzantine quorum systems , 1998, PODC '98.

[9]  Turgay Korkmaz,et al.  HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[10]  Serge Fdida,et al.  Research challenges towards the Future Internet , 2011, Comput. Commun..

[11]  Yih-Chun Hu,et al.  Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[12]  Qing Li,et al.  Data Caching in Selfish MANETs , 2005, ICCNMC.

[13]  Peidong Zhu,et al.  An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network , 2007, APNOMS.

[14]  Daniela Tulone Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems , 2007, Ad Hoc Networks.

[15]  Kenji Leibnitz,et al.  Biological principles for future internet architecture design , 2011, IEEE Communications Magazine.

[16]  Yasushi Saito,et al.  Optimistic replication , 2005, CSUR.

[17]  Yuguang Fang,et al.  Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[18]  John Lane,et al.  Byzantine replication under attack , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[19]  Yi Mu,et al.  Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks , 2005, EUC Workshops.

[20]  Jörg Hähner,et al.  Usenet-on-the-fly - Supporting Locality of Information in Spontaneous Networking Environments , 2003 .