Routing security scheme based on reputation evaluation in hierarchical ad hoc networks

In this paper, we propose a new Routing Security Scheme based on Reputation Evaluation (RSSRE) to meet security requirements in hierarchical ad hoc networks. In this model, the reputation relationship is defined in consideration of the related node roles and functions, while the reputation evaluation mechanism is built based on the correlation among nodes that need to be evaluated. The dynamic reputation threshold is used to improve routing security with the precondition of usability. The reputation information of nodes is updated with different roles. We can reconstruct the route to solve attack problems in transmitting packets. Simulation results show that compared with traditional reputation evaluation models, the proposed model in this paper can more timely and accurately reflect security status and execute improved routing when there are malicious nodes in hierarchical Ad Hoc networks.

[1]  Lei Guo,et al.  A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[2]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[3]  Dimitrios Vogiatzis,et al.  Security and Cooperation in clustered mobile ad hoc networks with centralized supervision , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[5]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[6]  Magdy S. El-Soudani,et al.  A Survey on Trust and Reputation Schemes in Ad Hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[7]  Todd R. Andel,et al.  Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols , 2008, Electron. Notes Theor. Comput. Sci..

[8]  Deep Medhi,et al.  A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.

[9]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[10]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[11]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[12]  Christian Damsgaard Jensen,et al.  Trust Evolution Policies for Security in Collaborative Ad Hoc Applications , 2006, STM.

[13]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[14]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[15]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[16]  Yu-Lung Lo,et al.  A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks , 2008, Comput. Stand. Interfaces.