Skip to main content
Log in

A Hyper-Geometric Trust Factor Based Markov Prediction Mechanism for Compromised Rendezvous Point in MANET

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In Mobile Ad hoc Network, reliable communication during multicasting depends on the root node or the rendezvous point of the multicast tree. But, any compromised root node poses a significant threat to the network that affects the reliability of packet delivery as the packets relayed from the upstream nodes to the downstream nodes are dropped in large numbers. A Markov based prediction model that forecasts the possibility of a mobile node to get infected by a rendezvous point attack is examined.This paper presents a Hyper-geometric Trust Factor based Markov Prediction Mechanism (HTFMPM) for mitigating rendezvous point attack that quantifies the influence of this attack in the context of multicast routing activity. This HTFMPM mechanism utilizes a Markov process for predicting the possibility of a mobile node getting compromised through rendezvous point attack using hyper-geometric distribution. Extensive simulations were conducted using ns-2 simulator and the results indicate that the rate of detection of rendezvous point attack using HTFMPM is 32% more rapid than that of the existing three benchmark mitigation mechanisms like Co-operation Of Nodes Fairness In Dynamic Ad-hoc NeTworks, Correlated Node Behavior Model and Probabilistic Behavior Model. In addition, the proposed hyper-geometric approach identifies that a co-operative mobile node gets converted into a compromised rendezvous point node within an average time of 6.23 s.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Buchegger, S.; Le Boudec, J.Y.: A robust Reputation system for mobile ad-hoc networks. EPFL IC Technical Report IC/2003/05

  2. Michiardi, P.; Molva, R.: CORE: A collborative repudiation mechanism to enforce node cooperating in mobile ad hoc networks. In: Proceeding of the 6th Joint Working Conference on Communications and Multimedia Security, pp. 107–121

  3. Mei A., Stefa J.: Give 2Get: forwarding in social mobile wireless networks of selfish individual. IEEE Trans. Dependable Secure Comput. 9(4), 569–581 (2012)

    Article  Google Scholar 

  4. Md. Akhtar A.K., Sahoo G.: Mathematical model for the detection of selfish nodes in MANETs. Int. J. Comput. Sci. Inform. 1(3), 25–28 (2008)

    Google Scholar 

  5. Marti S., Giuli T.J., Lai K., Baker M.: Mitigating routing misbehavior in mobile ad hoc networks. Mobile Comput. Netw. 1(1), 255–265 (2000)

    Google Scholar 

  6. Komathy K., Narayanasamy P.: A probabilistic behavioral model for selfish neighbors in a wireless ad hoc network. Int. J. Comput. Sci. Netw. Secur. 7(7), 77–82 (2007)

    Google Scholar 

  7. Hernandez-Orallo E., Serraty M.D., Cano J-C., Calafate T., Manzoni P.: Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Lett. 16(5), 642–645 (2012)

    Article  Google Scholar 

  8. Xing, F.; Wang, W.: Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. In: Processing of IEEE International Conference on Communications, vol. 4, No.3, pp. 1879–1884 (2006)

  9. Cárdenas A.A., Radosavac S., Baras J.S.: Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments. IEEE Trans. Netw. 17(2), 605–617 (2009)

    Article  Google Scholar 

  10. Xing F., Wang W.: On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE Trans. Dependable Secure Comput. 7(3), 284–299 (2010)

    Article  Google Scholar 

  11. Roy, S.; Addada, V.G.K.; Setia, S.; & Jajodia, S.: Securing MAODV: attacks and countermeasures In: 2nd IEEE International Conferences SECON (2005)

  12. Jiang S., He D., Rao J.: A prediction-based link availability estimation for routing metrics in MANETs. IEEE ACM Trans. Netw. 13(6), 1302–1312 (2005)

    Article  Google Scholar 

  13. Xia, H.; Xia, S.; Yu, J.; Jia, Z.; Sha, E.H.-M.: Applying link stability estimation mechanism to multicast routing in MANET’s. J. Syst. Archit. 467–480 (2014)

  14. De Rango F., Guerriero F., Fazio P.: Link-stability and energy aware routing protocol in distributed wireless networks. IEEE Trans. Parallel Distrib. Syst. 23(4), 713–726 (2012)

    Article  Google Scholar 

  15. Bergamo, P.; Giovanardi, A.; Travasoni, A.; Maniezzo, D.; Mazzini, G.; Zorzi, M.: Distributed Power Control for Energy Efficient Routing in Ad Hoc Networks, pp. 29–42. Springer, Berlin (2004)

  16. Kim D., Garcia-Luna-Aceves J.J., Obraczka K., Cano J.-C., Manzoni P.: Routing mechanisms for mobile ad hoc networks based on the energy drain rate. IEEE Trans. Mobile Comput. 2(2), 161–173 (2003)

    Article  Google Scholar 

  17. Hua E.Y., Haas Z.J.: An algorithm for prediction of link lifetime in MANET based on unscented Kalman Filter. IEEE Commun. Lett. 13(10), 782–784 (2009)

    Article  Google Scholar 

  18. Namuduri K., Pendse R.: Analytical estimation of path duration in mobile ad hoc networks. IEEE Sens. J. 12(6), 1828–1835 (2012)

    Article  Google Scholar 

  19. Sengathir, J.; Manoharan, R.: Security algorithms for mitigating selfish and shared root node attacks in MANETs. Int. J. Comput. Netw. Inf. Secur. 5(10), 1–10 (2013)

  20. Shandilya V., Simmons C.B., Shiva S.: Use of attack graphs in security systems. J. Comput. Netw. Commun. 7(7), 77–82 (2014)

    Google Scholar 

  21. Parthiban, S.; Rodrigues, P.: Probabilistic energy prediction coefficient based mitigation mechanism for rendezvous point attack in MANETs. In: 14th WSEAS International Conference on Advances in Software Engineering and Systems, Dubai, ISSN: 1790-5109, ISBN 978-61804-277-4, pp. 171–178 (2015)

  22. Parthiban, S.; Rodrigues, P.: Swarm based energy aware mitigation mechanism for root node attacks in MANETs. In: 13th WSEAS International Conference on Recent. Advances in Telecommunications, Informatics and Educational Technologies, Turkey, ISBN: 978-1-61804-262-0, pp. 199–207 5–17 (2014)

  23. Parthiban, S.; Rodrigues, Paul, Richardson, Kuder: Reputation coefficient based. Reputation mechanism for isolating root node attack in MANETs. Indian J. Sci. Technol. 8(15), 53211, pp. 1–9 (2015). ISSN: 0974-6846

  24. Azni A.H, Ahmad R., Noh Z.A.M., Basari A.S.H., Hussin B.: Correlated node behavior model based on semi Markov process for MANETS. Int. J. Comput. Sci. Issues 9(1), 25–32 (2013)

    Google Scholar 

  25. Komathy K., Narayanasamy P.: A probabilistic behavioral model for byzantine neighbors in a wireless ad hoc network. Int. J. Comput. Sci. Netw. Secur. 7(7), 77–82 (2007)

    Google Scholar 

  26. Buchegger, S.; Boudec, J-Y.: Nodes bearing grudges: towards routing security, fairness and robustness in mobile ad-hoc network. In: Presented at Tenth Eurominicro workshop on Parallel, Distributed and Network based Processing, Canary Islands, Spain (2002)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Parthiban.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parthiban, S., Rodrigues, P. A Hyper-Geometric Trust Factor Based Markov Prediction Mechanism for Compromised Rendezvous Point in MANET. Arab J Sci Eng 41, 3187–3199 (2016). https://doi.org/10.1007/s13369-016-2149-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-016-2149-8

Keywords

Navigation