Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation

  • Tao Lin 1. School of Automation, Chongqing University, Chongqing 400044, China 2. Chongqing College of Electronic Engineering, Chongqing 401331, China
  • Peng Wu 1. School of Automation, Chongqing University, Chongqing 400044, China 2. Chongqing Chuanyi Automation Co., Ltd., Chongqing, China, 401121, China
  • Fengmei Gao Chongqing College of Electronic Engineering, Chongqing 401331, China
  • Tianshu Wu College of Computer Science , Chongqing University, Chongqing 400044, China

Abstract

The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to the high mobility of nodes, the weakness of transmission media and the absence of central node. To overcome the vulnerability, this paper mainly studies the way to detect selfish nodes in the MANET, and thus prevent network intrusion. Specifically, a data-driven reputation evaluation model was proposed to detect selfish nodes using a new reputation mechanism. The mechanism consists of a monitoring module, a reputation evaluation module, penalty module and a response module. The MANET integrated with our reputation mechanism was compared with the traditional MANET through simulation. The results show that the addition of reputation mechanism can suppress the selfish behavior of network nodes and enhance network security.

References

[1] Almousa, Z.; Nasir Q. (2015). cl-CIDPS: A cloud computing based cooperative intrusion detection and prevention system framework, Communications in Computer & Information Science, 523, 181-194, 2015.
https://doi.org/10.1007/978-3-319-19210-9_13

[2] Al-Sultan, S.; Al-Doori, M. M.; Al-Bayatti, A. H.; Zedan, H. (2014). A comprehensive survey on vehicular Ad Hoc network, Journal of Network & Computer Applications, 37(1), 380-392, 2014.
https://doi.org/10.1016/j.jnca.2013.02.036

[3] Azees, M.; Jegatha, D. L.; Vijayakumar, P. (2016). A comprehensive survey on security services in vehicular ad-hoc networks (VANETs), IET Intelligent Transport Systems, 10(6), 379-388, 2016.
https://doi.org/10.1049/iet-its.2015.0072

[4] Camp, T.; Boleng, J.; Davies, V. (2002). A survey of mobility models for ad hoc network research, Wireless Communications and Mobile Computing, 2(5), 483-502, 2002.
https://doi.org/10.1002/wcm.72

[5] He, S.; Chen, J.; Li, X.; Shen, X. M.; Sun, Y. X. (2012). Leveraging prediction to improve the coverage of wireless sensor networks, IEEE Transactions on Parallel & Distributed Systems, 23(4), 701-712, 2012.
https://doi.org/10.1109/TPDS.2011.180

[6] Jaramillo, J. J.; Srikant, R. (2010). A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks, Ad Hoc Networks, 8(4), 416-429, 2010.
https://doi.org/10.1016/j.adhoc.2009.10.002

[7] Moati, N.; Otrok, H.; Mourad, A.; Robert, J. M. (2014). Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol, Wireless Personal Communications, 75(3), 1747-1768, 2014.
https://doi.org/10.1007/s11277-013-1419-y

[8] Moussaoui, A.; Semchedine, F.; Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for mobile Ad Hoc networks, Journal of Network & Computer Applications, 39(1), 117-125, 2014.
https://doi.org/10.1016/j.jnca.2013.05.014

[9] Pan, D.; Zhang, H.; Chen, W. J.; Lu, K. (2015). Transmission of multimedia contents in opportunistic networks with social selfish nodes, Multimedia Systems, 21(3), 277-288, 2015.
https://doi.org/10.1007/s00530-013-0343-z

[10] Patel, N.; Srivastava, S. (2012). Packet forwarding strategies for cooperation enforcement in mobile Ad Hoc wireless networks, Lecture Notes in Computer Science, 7154, 200-211, 2012.
https://doi.org/10.1007/978-3-642-28073-3_18

[11] Rodriguez-Mayol, A.; Gozalvez, J. (2014). Reputation based selfishness prevention techniques for mobile ad-hoc networks, Telecommunication Systems, 57(2), 181-195, 2014.
https://doi.org/10.1007/s11235-013-9786-y

[12] Subramaniyan, S.; Johnson, W.; Subramaniyan, K. (2014). A distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique, EURASIP Journal on Wireless Communications and Networking, (1), 205-221, 2014.
https://doi.org/10.1186/1687-1499-2014-205

[13] Sun, G.; Bin, S. (2017). Router-level internet topology evolution model based on multisubnet composited complex network model, Journal of Internet Technology, 18(6), 1275- 1283, 2017.

[14] Sun, J.; Zhang, C.; Zhang, Y.; Fang, Y. G. (2011). SAT: A security architecture achieving anonymity and traceability in wireless mesh networks, IEEE Transactions on Dependable and Secure Computing, 8(2), 295-307, 2011.
https://doi.org/10.1109/TDSC.2009.50

[15] Tang, C.B.; Li, X.; Wang, Z. (2017). Cooperation and distributed optimization for the unreliable wireless game with indirect reciprocity, Science China (Information Sciences), (11), 129-145, 2017.
https://doi.org/10.1007/s11432-017-9165-7

[16] Umar, R.; Mesbah, W. (2018). Throughput-efficient coalition formation of selfish/altruistic nodes in ad hoc networks: A hedonic game approach, Telecommunication Systems, 67(1), 1-17, 2018.
https://doi.org/10.1007/s11235-017-0323-2
Published
2019-11-17
How to Cite
LIN, Tao et al. Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 14, n. 5, p. 660-671, nov. 2019. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/3629>. Date accessed: 15 apr. 2021. doi: https://doi.org/10.15837/ijccc.2019.5.3629.

Keywords

Mobile ad hoc network (MANET), intrusion detection, reputation mechanism, node reputation