Fine-Grained Analysis of Packet Loss in MANETs

Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. There may be several reasons for packet losses, such as interference, queue overflow, and node mobility. Identifying the real underlying cause of a packet loss event is important for any security solution. To detect truly malicious nodes, it is necessary to carry out a fine-grained analysis (FGA) to determine the underlying cause of such loss. Without such analysis, the performance of any security solution may degrade, due to the punishment of innocent nodes while actual malicious nodes may remain undetected. Therefore, approaches are required that can correctly identify the reason for packet losses and can react accordingly. In this paper, we present a scheme that is able to correctly identify malicious nodes, using network parameters to determine whether packet losses are due to queue overflows or node mobility in MANETs. The contributions of this paper include the FGA scheme for packet loss and the development of a comprehensive trust model for malicious node identification and isolation. Our proposed FGA scheme is evaluated in terms of effectiveness and performance metrics under different network parameters and configurations. The experimental results show that our proposed trust model achieves a significant reduction in false positives rate and an increase in the rate of detection of truly malicious nodes compared with traditional non-FGA schemes.

[1]  Won-Hyung Lee,et al.  Load Balanced Congestion Adaptive Routing for Mobile Ad Hoc Networks , 2014, Int. J. Distributed Sens. Networks.

[2]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[3]  K. Selvakumar,et al.  Eaack- A Secure Intrusion Detection System for Manets , 2015 .

[4]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[5]  Amandeep Amandeep,et al.  Performance Analysis and Comparison of Scheduling Algorithm in MANET’s , 2011 .

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[9]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  Thomas Clausen,et al.  Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .

[11]  Bharat Bhargava,et al.  Packet Loss in Mobile Ada Hoc Networks , 2003 .

[12]  Ramon Sanchez-Iborra,et al.  An Experimental QoE Performance Study for the Efficient Transmission of High Demanding Traffic over an Ad Hoc Network Using BATMAN , 2015, Mob. Inf. Syst..

[13]  Philippe Jacquet,et al.  Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .

[14]  Zhihui,et al.  A Load-based Queue Scheduling Algorithm for MANET , 2006 .

[15]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.

[16]  Xiaoping Li,et al.  Trust based routing mechanism for securing OSLR-based MANET , 2015, Ad Hoc Networks.

[17]  Elisa Bertino,et al.  Fine-grained analysis of packet losses in wireless sensor networks , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[18]  Tarek R. Sheltami,et al.  A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs , 2014, J. Ambient Intell. Humaniz. Comput..

[19]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[20]  Farooq Anjum,et al.  LiPaD: lightweight packet drop detection for ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[21]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[22]  Thomas Kunz,et al.  Mobility Metrics to Enable Adaptive Routing in MANET , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[23]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[24]  Rafael Timóteo de Sousa Júnior,et al.  Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..

[25]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[26]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[27]  Anupam Joshi,et al.  On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[28]  Ming Zhao,et al.  Modeling and Analytical Study of Link Properties in Multihop Wireless Networks , 2012, IEEE Transactions on Communications.

[29]  H. T. Mouftah,et al.  AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[30]  George K. Papageorgiou,et al.  Cross-Layered Security Analysis of Wireless Ad Hoc Networks , 2004 .

[31]  Asaf Shabtai,et al.  Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.

[32]  Xiaoping Li,et al.  A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[33]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[34]  Stephen B. Wicker,et al.  On the behavior of communication links of a node in a multi-hop mobile environment , 2004, MobiHoc '04.

[35]  Chai Kiat Yeo,et al.  Distributed Court System for intrusion detection in mobile ad hoc networks , 2011, Comput. Secur..

[36]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.