Abstract
Data delivery in ad hoc networks requires co-operation as the predominant factor for ensuring pause-less communication between the nodes due to their self-organizing nature. This decentralized feature of ad hoc networks enables adversaries to compromise nodes through Byzantine attacks and induce them to act maliciously for degrading the performance of the network. These Byzantine nodes degrade the performance by selectively dropping the packets, modifying the packets or dropping the packets without forwarding for the sake of conserving their own energy. In this paper, we propose a Context-aware Conditional Probabilistic Hyper-exponential Reputation Scheme (CCPHRT) for improving the efficiency and effectiveness in detecting byzantine nodes. This CCPHRT mitigates byzantine nodes based on Hyper-exponential Conditional Survivability Factor (HCSF) as each mobile node’s behavioural transition is hypo-exponentially distributed as the inter-transition time is independent and exponentially modeled. Extensive simulations are performed and the obtained results prove that CCPHRT is effective in improving the performance of the network than the compared techniques used for investigation. CCPHRT also facilitates a dynamic byzantine node isolation degree of 34% which is better than the baseline byzantine mitigation techniques used for study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Xing, F., Wang, W.: On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE Trans. Dependable Secur. Comput. 7(3), 284–299 (2010)
Md. Akhtar, A.K., Sahoo, G.: Mathematical model for the detection of byzantine nodes in MANETs. Int. J. Comput. Sci. Inform. 1(3), 25–28 (2008)
Buchegger, S., Boudec, J.Y.: Nodes bearing grudges: towards routing security, fairness and robustness in mobile ad-hoc network. Presented at Tenth Eurominicro workshop on Parallel, Distributed and Network based Processing, Canary Islands, Spain (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. Mob. Comput. Netw. 1(1), 255–265 (2000)
Corradi, G., Janssen, J., Manca, R.: Numerical treatment of homogenous semi-Markov processes in transient case-a straightforward approach. Methodol. Comput. Appl. Probab. 6, 233–246 (2004)
Sundarajan, T., Shanmugam, A.: Modeling the behavior of byzantine forwarding nodes to simulate cooperation in MANET. Int. J. 2(2), 147–160 (2010)
Xing, F., Wang, W.: Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In: Proceedings of IEEE International Conference on Communications, vol. 4, no. 3, pp. 1879–1884 (2006)
Cárdenas, A.A., Radosavac, S., Baras, J.S.: Evaluation of detection algorithms for MAC layer misbehaviour: theory and experiments. IEEE Trans. Netw. 17(2), 605–617 (2009)
Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)
Raghavan, B., Snoeren, A.C.: Priority forwarding in ad hoc networks with self-interested parties. In: Proceedings of Workshop on Economics of Peer-to-Peer Systems, vol. 2, no. 3, pp. 34–46 (2003)
Meka, H., Madria, S., Linderman, M.: Incentive based approach to byzantine nodes in mobile P2P networks. In: Proceedings of IEEE 31st International Performance Computing and Communications Conference, vol. 1, no. 6, pp. 352–359 (2012)
Huang, E., Crowcroft, J., Wassell, I.: Rethinking incentives for mobile ad hoc networks. In: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, vol. 2, no. 3, pp. 191–196 (2004)
Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM, vol. 2, no. 5, pp. 1987–1997 (2012)
Demir, C., Comaniciu, C.: An auction based AODV protocol for mobile ad hoc networks with selfish nodes. In: Proceedings of IEEE International Conference on Communications, vol. 2, no. 7, pp. 3351–3356 (2007)
Zhou, H., Wu, J., Zhao, H., Tang, S., Chen, C., Chen, J.: Incentive-driven and freshness aware content dissemination in selfish opportunistic mobile networks. IEEE Trans. Parallel Distrib. Syst. 26(9), 2493–2505 (2015)
Appenzeller, M.G., Baker, M.: User-friendly access control for public network ports. In: Proceedings of IEEE INFOCOM, vol. 1, no. 6, pp. 699–707 (1999)
Kathirvel, A., Srinivasan, R.: Single umpiring system for security of mobile ad hoc networks. J. Adv. Wirel. Mob. Commun. 2(3), 46–54 (2009)
Sukumaran, S., Venkatesh, J.: Comparison of access control methods in mobile ad-hoc networks. In: Proceedings of IEEE International Conference on Internet Multimedia Services Architecture and Applications, vol. 4, no. 2, pp. 1–5 (2009)
Xu, Y., Scerri, P.: Token based resource sharing in heterogeneous multi-agent teams. In: Yang, J.-J., Yokoo, M., Ito, T., Jin, Z., Scerri, P. (eds.) PRIMA 2009. LNCS (LNAI), vol. 5925, pp. 113–126. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-11161-7_8
Hallani, H., Shahrestani, S.: Improving the performance of wireless adhoc networks: accounting for the behaviour of selfish nodes. Commun. IBIMA 2(4), 165–174 (2011)
Sanzgiri, K., Levine, B.N., Shields, C., Dahill, B., Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, vol. 3, no. 5, pp. 78–87 (2002)
Liu, K., Deng, J., Varshney, P., Balakrishnan, K.: An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)
Balakrishnan, V.C., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking Conference, vol. 4, no 1, pp. 2137–2142 (2005)
Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, vol. 1, no. 1, pp. 107–121 (2001)
Refaei, M.T., Srivastava, V., Eltoweissy, M.: A reputation-based mechanism for isolating selfish nodes. In: Proceedings of 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services Ad Hoc Networks, vol. 2, no. 3, pp. 3–11 (2005)
Wang, Y., Giruka, V.C., Singhal, M.: Truthful multipath routing for ad hoc networks with selfish nodes. J. Parallel Distrib. Comput. 68(6), 778–789 (2008)
Wang, F., Wang, F., Huang, B., Yang, L.T.: COSR: a reputation based secure route protocol in MANET. EURASIP J. Wirel. Commun. Netw. 20(10), 1–11 (2010). Special issue on multimedia communications over next generation wireless networks archive
Tarag, F., Robert, A.: A node misbehaviour detection mechanism for mobile ad hoc networks. In: Proceedings of 7th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, vol. 1, no. 1, pp. 78–84 (2006)
Subramaniyan, S., Johnson, W., Subramaniyan, K.: A distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP J. Wirel. Commun. Netw. 4(3), 31–39 (2014)
Hortelano, C., Calafate, T., Cano, J.C., Mecella, M.: Black-hole attacks in p2p mobile networks discovered through Bayesian filters. In: Proceedings of OTM Workshops, vol. 2, no. 6, pp. 543–552 (2010)
Chun, B.G., Chaudhuri, K., Wee, H., Barreno, M., Papadimitriou, C.H., Kubiatowicz, J.: Selfish caching in distributed systems: a game-theoretic analysis. In: Proceedings of the 23th Annual ACM Symposium on Principles of Distributed Computing, vol. 7, no. 4, pp. 21–30 (2004)
Vallam, R.D., Antony Franklin, A., Siva Ramamurthy, C.: Modeling co-operative MAC layer misbehaviour in IEEE 802.11 ad hoc networks with heterogeneous loads. In: Proceedings of 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, WIOPT, Berlin, Germany, vol. 1, no. 1, pp. 197–206 (2008)
Jaggi, N., Giri, V.R., Namboodiri, V.: Distributed reaction mechanisms to prevent byzantine misbehaviour in wireless ad hoc networks. In: Proceedings of IEEE Global Communications Conference, Houston, Texas, USA, vol. 1, no. 1, pp. 1–6 (2011)
Hernandez-Orallo, E., Serraty, M.D., Cano, J.-C., Calafate, T., Manzoni, P.: Improving byzantine node detection in MANETs using a collaborative watchdog. IEEE Lett. 16(5), 642–645 (2012)
Fahad, T., Askwith, R.: A node misbehaviour detection mechanism for mobile ad hoc networks. In: PGNet (2006)
Buchegger, J., Boudec, J.Y.: Performance analysis of confidant protocol. In: Proceedings of 3rd International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, pp. 226–236 (2002)
Sathiyamoorthy, E., Iyenger, N.C., Narayana, S., Ramachandran, V.: Agent based trust management model based on weight value model for online auctions. Int. J. Netw. Secur. Appl. (IJNSA) 1(3), 15–31 (2009)
Tang, J., Cheng, Y., Zhuang, W.: An analytical approach to real-time misbehaviour detection in IEEE 802.11 based wireless networks. In: Proceedings of 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Shanghai, China, vol. 1, no. 1, pp. 1638–1646 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Achuthan, G., Niladuri, S., Sareeka, A.G. (2018). Context-Aware Conditional Probabilistic Hyper-exponential Reputation Technique for Mitigating Byzantine Attacks. In: Venkataramani, G., Sankaranarayanan, K., Mukherjee, S., Arputharaj, K., Sankara Narayanan, S. (eds) Smart Secure Systems – IoT and Analytics Perspective. ICIIT 2017. Communications in Computer and Information Science, vol 808. Springer, Singapore. https://doi.org/10.1007/978-981-10-7635-0_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-7635-0_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7634-3
Online ISBN: 978-981-10-7635-0
eBook Packages: Computer ScienceComputer Science (R0)