A node management scheme for stable P2P service in mobile ad-hoc networks

In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.

[1]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[2]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[3]  M. S. Corson,et al.  Architectural considerations for mobile mesh networking , 1996, Proceedings of MILCOM '96 IEEE Military Communications Conference.

[4]  Seok-Joong ICangl,et al.  Multi-Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network , 2006 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[7]  Yaqiong Liu,et al.  An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[8]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[9]  Joseph P. Macker,et al.  Mobile ad hoc networking and the IETF , 1998, MOCO.