An accurate and precise malicious node exclusion mechanism for ad hoc networks

Abstract Mobile ad hoc networks are attractive due to the wireless communication, infrastructure-less design, and the self-organized mobile nodes. These features, however, introduce vulnerabilities, since there are no centralized control elements and the communication depends on cooperation of nodes. We propose a robust and distributed access control mechanism based on a trust model to secure the network and stimulate cooperation by excluding misbehaving nodes from the network. The mechanism divides the access control responsibility into two contexts: local and global. The local context responsibility is the neighborhood watch to notify the global context about suspicious behavior. In its turn, the global context analyzes the received information and decides whether it punishes the suspicious node using a voting scheme. We model the exclusion mechanism and perform a parameter analysis. Simulation results prove that the combination of voting and trust schemes provides an accurate and precise classification and node exclusion mechanism, even though in scenarios of limited monitoring.

[1]  Leonard Kleinrock,et al.  PLASMA: A new routing paradigm for wireless multihop networks , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  Nei Kato,et al.  A Study on Certificate Revocation in Mobile Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[4]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[5]  Qian Zhang,et al.  COFFEE: A Context-Free Protocol for Stimulating Data Forwarding in Wireless Ad Hoc Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[6]  Otto Carlos Muniz Bandeira Duarte,et al.  An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks , 2009, IEEE INFOCOM 2009.

[7]  Patrick Th. Eugster,et al.  DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[8]  Muthucumaru Maheswaran,et al.  A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[9]  Wolfgang Kellerer,et al.  Castor: Scalable Secure Routing for Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[11]  Kefei Chen,et al.  Self-generated-certificate public key encryption without pairing and its application , 2011, Inf. Sci..

[12]  David Johnson,et al.  Comparison of two routing metrics in OLSR on a grid based mesh network , 2009, Ad Hoc Networks.

[13]  Hassan Artail,et al.  A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.

[14]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[15]  Shouhuai Xu,et al.  LHAP: A lightweight network access control protocol for ad hoc networks , 2006, Ad Hoc Networks.

[16]  Pekka Nikander,et al.  Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.

[17]  Antonio Capone,et al.  A framework for detecting selfish misbehavior in wireless mesh community networks , 2009, Q2SWinet '09.

[18]  Peng Ning,et al.  MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks , 2012, Ad Hoc Networks.

[19]  Otto Carlos Muniz Bandeira Duarte,et al.  A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[20]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.