Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT

Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital role in future Industrial Internet-of-Things communication, where smart devices will be connected in a completely distributed manner. However, due to lack of infrastructure and absence of centralized administration, MANETs are shrouded with various security threats. Some internal mobile nodes in these resource constrained networks may compromise the routing mechanism in order to launch denial-of-service attacks to carry out distinct kinds of packet forwarding misbehaviors. In order to address this issue, in our previous paper, we devised a trusted routing scheme with pattern discovery (TRS-PD), which identifies packet dropping adversaries in advance by monitoring and analyzing their behavior during route discovery phase. In this paper, we perform sensitivity analysis of TRS-PD which is carried out by varying values of different parameters in distinct network scenarios in the existence of three distinct packet dropping attacks. In addition, this work summarizes the attack-pattern discovery mechanism, trust model, and routing mechanism adopted by TRS-PD in order to counter the adversaries which follow certain attack patterns along with other adversaries. Experiments conducted with network simulator-2 indicate the correct choices of parameter values for distinct network scenarios.

[1]  Carlos Miguel Tavares Calafate,et al.  TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs , 2017, Veh. Commun..

[2]  Nader Mohamed,et al.  TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[3]  Kim-Kwang Raymond Choo,et al.  Hypergraph partitioning for social networks based on information entropy modularity , 2017, J. Netw. Comput. Appl..

[4]  J. Martin Leo Manickam,et al.  Design and Development of CTSR with Direct & Indirect Observations of MANET Applications , 2017, Mob. Networks Appl..

[5]  Jie Wu,et al.  Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.

[6]  Weiwei Lin,et al.  An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.

[7]  Qin Liu,et al.  Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.

[8]  Jin Li,et al.  Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Dongqing Xie,et al.  Social influence modeling using information theory in mobile social networks , 2017, Inf. Sci..

[10]  Olayinka Adigun,et al.  Towards a scalable routing approach for Mobile Ad-hoc Networks , 2015, 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD).

[11]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[12]  Jie Wu,et al.  Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..

[13]  Sandeep A. Thorat,et al.  Uncertainty analysis framework for trust based routing in MANET , 2017, Peer Peer Netw. Appl..

[14]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[15]  N. Kannan,et al.  Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET , 2017, Wirel. Networks.

[16]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[17]  Nadeem Javaid,et al.  MATF: a multi-attribute trust framework for MANETs , 2016, EURASIP J. Wirel. Commun. Netw..

[18]  Jin Li,et al.  Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..

[19]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[20]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[21]  Rutvij H. Jhaveri,et al.  Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks , 2017, Int. J. Commun. Syst..

[22]  Abdelfettah Belghith,et al.  DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks , 2017, KSII Trans. Internet Inf. Syst..

[23]  Rutvij H. Jhaveri,et al.  A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.

[24]  Guopu Zhu,et al.  Transportation Spherical Watermarking , 2018, IEEE Transactions on Image Processing.

[25]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[26]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[27]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[28]  Rutvij H. Jhaveri,et al.  Mobile Ad-hoc Networking with AODV: A Review , 2015, Int. J. Next Gener. Comput..

[29]  W. Marsden I and J , 2012 .

[30]  Xiaohua Tian,et al.  AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.