Trust-Enabled Link Spoofing Detection in MANET

Ad hoc networks operate over open environments and are hence vulnerable to a large body of threats. To tackle this issue, we propose a distributed, signature-based anomaly detector that evaluates the trustworthiness of others so as to secure such a distributed detection. Contrary to existing detectors that passively observe packets, our detector analyses logs so as to identify patterns of misuse and proactively collaborate with others to gather additional evidences. As a result, no change is requested in the implementation of the node. The main challenge stems from difficulty involved in stating the occurrence of an attack based on second-hands evidences that may come from colluding attacker (s). To tackle this issue, we propose an entropy-based trust system that evaluates the trustworthiness of the nodes that provide the evidences. We further introduce a novel indicator which measures the level of confidence in the detection. Preliminary evaluations of the trust system along with the confidence measure have been conducted.

[1]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[2]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[3]  Michael S Lewis-Beck,et al.  Sage university papers. Series Quantitative applications in the social sciences , 2008 .

[4]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  F. Sailhan,et al.  Log-based Link Spoofing Detection in MANET , 2011 .

[6]  Abdul Sattar,et al.  A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks , 2010, 2010 Fourth International Conference on Network and System Security.

[7]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[8]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[9]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[10]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[11]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[12]  F. Cuppens,et al.  Property Based Intrusion Detection to Secure OLSR , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[13]  Feng Lu,et al.  Research on Identity-Based Cluster Access Control Model with Dynamic Trust Agent for Mobile Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[16]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[17]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[18]  Li Xu,et al.  A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[19]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[20]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for Mobile Ad-Hoc Networks with liars , 2008, Perform. Evaluation.

[21]  Muthucumaru Maheswaran,et al.  Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).

[22]  M. Smithson Confidence Intervals (7th ed) , 2003 .

[23]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[24]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[25]  William W. Cohen Fast Effective Rule Induction , 1995, ICML.

[26]  A. Antony Franklin,et al.  On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks , 2008, 2008 16th IEEE International Conference on Networks.

[27]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.