Skip to main content

Context-Aware Conditional Probabilistic Hyper-exponential Reputation Technique for Mitigating Byzantine Attacks

  • Conference paper
  • First Online:
Smart Secure Systems – IoT and Analytics Perspective (ICIIT 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 808))

Included in the following conference series:

  • 1504 Accesses

Abstract

Data delivery in ad hoc networks requires co-operation as the predominant factor for ensuring pause-less communication between the nodes due to their self-organizing nature. This decentralized feature of ad hoc networks enables adversaries to compromise nodes through Byzantine attacks and induce them to act maliciously for degrading the performance of the network. These Byzantine nodes degrade the performance by selectively dropping the packets, modifying the packets or dropping the packets without forwarding for the sake of conserving their own energy. In this paper, we propose a Context-aware Conditional Probabilistic Hyper-exponential Reputation Scheme (CCPHRT) for improving the efficiency and effectiveness in detecting byzantine nodes. This CCPHRT mitigates byzantine nodes based on Hyper-exponential Conditional Survivability Factor (HCSF) as each mobile node’s behavioural transition is hypo-exponentially distributed as the inter-transition time is independent and exponentially modeled. Extensive simulations are performed and the obtained results prove that CCPHRT is effective in improving the performance of the network than the compared techniques used for investigation. CCPHRT also facilitates a dynamic byzantine node isolation degree of 34% which is better than the baseline byzantine mitigation techniques used for study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xing, F., Wang, W.: On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE Trans. Dependable Secur. Comput. 7(3), 284–299 (2010)

    Article  Google Scholar 

  2. Md. Akhtar, A.K., Sahoo, G.: Mathematical model for the detection of byzantine nodes in MANETs. Int. J. Comput. Sci. Inform. 1(3), 25–28 (2008)

    Google Scholar 

  3. Buchegger, S., Boudec, J.Y.: Nodes bearing grudges: towards routing security, fairness and robustness in mobile ad-hoc network. Presented at Tenth Eurominicro workshop on Parallel, Distributed and Network based Processing, Canary Islands, Spain (2002)

    Google Scholar 

  4. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. Mob. Comput. Netw. 1(1), 255–265 (2000)

    Google Scholar 

  5. Corradi, G., Janssen, J., Manca, R.: Numerical treatment of homogenous semi-Markov processes in transient case-a straightforward approach. Methodol. Comput. Appl. Probab. 6, 233–246 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Sundarajan, T., Shanmugam, A.: Modeling the behavior of byzantine forwarding nodes to simulate cooperation in MANET. Int. J. 2(2), 147–160 (2010)

    Google Scholar 

  7. Xing, F., Wang, W.: Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In: Proceedings of IEEE International Conference on Communications, vol. 4, no. 3, pp. 1879–1884 (2006)

    Google Scholar 

  8. Cárdenas, A.A., Radosavac, S., Baras, J.S.: Evaluation of detection algorithms for MAC layer misbehaviour: theory and experiments. IEEE Trans. Netw. 17(2), 605–617 (2009)

    Article  Google Scholar 

  9. Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)

    Article  Google Scholar 

  10. Raghavan, B., Snoeren, A.C.: Priority forwarding in ad hoc networks with self-interested parties. In: Proceedings of Workshop on Economics of Peer-to-Peer Systems, vol. 2, no. 3, pp. 34–46 (2003)

    Google Scholar 

  11. Meka, H., Madria, S., Linderman, M.: Incentive based approach to byzantine nodes in mobile P2P networks. In: Proceedings of IEEE 31st International Performance Computing and Communications Conference, vol. 1, no. 6, pp. 352–359 (2012)

    Google Scholar 

  12. Huang, E., Crowcroft, J., Wassell, I.: Rethinking incentives for mobile ad hoc networks. In: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, vol. 2, no. 3, pp. 191–196 (2004)

    Google Scholar 

  13. Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM, vol. 2, no. 5, pp. 1987–1997 (2012)

    Google Scholar 

  14. Demir, C., Comaniciu, C.: An auction based AODV protocol for mobile ad hoc networks with selfish nodes. In: Proceedings of IEEE International Conference on Communications, vol. 2, no. 7, pp. 3351–3356 (2007)

    Google Scholar 

  15. Zhou, H., Wu, J., Zhao, H., Tang, S., Chen, C., Chen, J.: Incentive-driven and freshness aware content dissemination in selfish opportunistic mobile networks. IEEE Trans. Parallel Distrib. Syst. 26(9), 2493–2505 (2015)

    Article  Google Scholar 

  16. Appenzeller, M.G., Baker, M.: User-friendly access control for public network ports. In: Proceedings of IEEE INFOCOM, vol. 1, no. 6, pp. 699–707 (1999)

    Google Scholar 

  17. Kathirvel, A., Srinivasan, R.: Single umpiring system for security of mobile ad hoc networks. J. Adv. Wirel. Mob. Commun. 2(3), 46–54 (2009)

    Google Scholar 

  18. Sukumaran, S., Venkatesh, J.: Comparison of access control methods in mobile ad-hoc networks. In: Proceedings of IEEE International Conference on Internet Multimedia Services Architecture and Applications, vol. 4, no. 2, pp. 1–5 (2009)

    Google Scholar 

  19. Xu, Y., Scerri, P.: Token based resource sharing in heterogeneous multi-agent teams. In: Yang, J.-J., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds.) PRIMA 2009. LNCS (LNAI), vol. 5925, pp. 113–126. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-11161-7_8

    Chapter  Google Scholar 

  20. Hallani, H., Shahrestani, S.: Improving the performance of wireless adhoc networks: accounting for the behaviour of selfish nodes. Commun. IBIMA 2(4), 165–174 (2011)

    Google Scholar 

  21. Sanzgiri, K., Levine, B.N., Shields, C., Dahill, B., Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, vol. 3, no. 5, pp. 78–87 (2002)

    Google Scholar 

  22. Liu, K., Deng, J., Varshney, P., Balakrishnan, K.: An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)

    Article  Google Scholar 

  23. Balakrishnan, V.C., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking Conference, vol. 4, no 1, pp. 2137–2142 (2005)

    Google Scholar 

  24. Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, vol. 1, no. 1, pp. 107–121 (2001)

    Google Scholar 

  25. Refaei, M.T., Srivastava, V., Eltoweissy, M.: A reputation-based mechanism for isolating selfish nodes. In: Proceedings of 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services Ad Hoc Networks, vol. 2, no. 3, pp. 3–11 (2005)

    Google Scholar 

  26. Wang, Y., Giruka, V.C., Singhal, M.: Truthful multipath routing for ad hoc networks with selfish nodes. J. Parallel Distrib. Comput. 68(6), 778–789 (2008)

    Article  MATH  Google Scholar 

  27. Wang, F., Wang, F., Huang, B., Yang, L.T.: COSR: a reputation based secure route protocol in MANET. EURASIP J. Wirel. Commun. Netw. 20(10), 1–11 (2010). Special issue on multimedia communications over next generation wireless networks archive

    Google Scholar 

  28. Tarag, F., Robert, A.: A node misbehaviour detection mechanism for mobile ad hoc networks. In: Proceedings of 7th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, vol. 1, no. 1, pp. 78–84 (2006)

    Google Scholar 

  29. Subramaniyan, S., Johnson, W., Subramaniyan, K.: A distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP J. Wirel. Commun. Netw. 4(3), 31–39 (2014)

    Google Scholar 

  30. Hortelano, C., Calafate, T., Cano, J.C., Mecella, M.: Black-hole attacks in p2p mobile networks discovered through Bayesian filters. In: Proceedings of OTM Workshops, vol. 2, no. 6, pp. 543–552 (2010)

    Google Scholar 

  31. Chun, B.G., Chaudhuri, K., Wee, H., Barreno, M., Papadimitriou, C.H., Kubiatowicz, J.: Selfish caching in distributed systems: a game-theoretic analysis. In: Proceedings of the 23th Annual ACM Symposium on Principles of Distributed Computing, vol. 7, no. 4, pp. 21–30 (2004)

    Google Scholar 

  32. Vallam, R.D., Antony Franklin, A., Siva Ramamurthy, C.: Modeling co-operative MAC layer misbehaviour in IEEE 802.11 ad hoc networks with heterogeneous loads. In: Proceedings of 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, WIOPT, Berlin, Germany, vol. 1, no. 1, pp. 197–206 (2008)

    Google Scholar 

  33. Jaggi, N., Giri, V.R., Namboodiri, V.: Distributed reaction mechanisms to prevent byzantine misbehaviour in wireless ad hoc networks. In: Proceedings of IEEE Global Communications Conference, Houston, Texas, USA, vol. 1, no. 1, pp. 1–6 (2011)

    Google Scholar 

  34. Hernandez-Orallo, E., Serraty, M.D., Cano, J.-C., Calafate, T., Manzoni, P.: Improving byzantine node detection in MANETs using a collaborative watchdog. IEEE Lett. 16(5), 642–645 (2012)

    Article  Google Scholar 

  35. Fahad, T., Askwith, R.: A node misbehaviour detection mechanism for mobile ad hoc networks. In: PGNet (2006)

    Google Scholar 

  36. Buchegger, J., Boudec, J.Y.: Performance analysis of confidant protocol. In: Proceedings of 3rd International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, pp. 226–236 (2002)

    Google Scholar 

  37. Sathiyamoorthy, E., Iyenger, N.C., Narayana, S., Ramachandran, V.: Agent based trust management model based on weight value model for online auctions. Int. J. Netw. Secur. Appl. (IJNSA) 1(3), 15–31 (2009)

    Google Scholar 

  38. Tang, J., Cheng, Y., Zhuang, W.: An analytical approach to real-time misbehaviour detection in IEEE 802.11 based wireless networks. In: Proceedings of 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Shanghai, China, vol. 1, no. 1, pp. 1638–1646 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetha Achuthan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Achuthan, G., Niladuri, S., Sareeka, A.G. (2018). Context-Aware Conditional Probabilistic Hyper-exponential Reputation Technique for Mitigating Byzantine Attacks. In: Venkataramani, G., Sankaranarayanan, K., Mukherjee, S., Arputharaj, K., Sankara Narayanan, S. (eds) Smart Secure Systems – IoT and Analytics Perspective. ICIIT 2017. Communications in Computer and Information Science, vol 808. Springer, Singapore. https://doi.org/10.1007/978-981-10-7635-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7635-0_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7634-3

  • Online ISBN: 978-981-10-7635-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics