Advertisement

Mobile Networks and Applications

, Volume 17, Issue 3, pp 342–352 | Cite as

Security Through Collaboration and Trust in MANETs

  • Wenjia Li
  • James Parker
  • Anupam Joshi
Article

Abstract

It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behaviors such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative and trust-based outlier detection algorithm that factors in a node’s reputation for MANETs. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.

Keywords

outlier detection mobile ad hoc network security misbehavior multi-dimensional trust 

References

  1. 1.
    Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Wireless Network Security (Part II, Chapter 12), SpringerGoogle Scholar
  2. 2.
    Zhang Y, Lee W (2002) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 275–283Google Scholar
  3. 3.
    Hu Y, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 12–23Google Scholar
  4. 4.
    Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting black-hole attack in mobile ad hoc networks. In Proceedings of 5th European Personal Mobile Communications Conference, Glasgow, Scotland, UK, pp 490–495Google Scholar
  5. 5.
    Grubbs F (1969) Procedures for detecting outlying observations in samples. Technometrics 11(1):1–21Google Scholar
  6. 6.
    Lazarevic A, Ertoz L, Ozgur A, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, USA, MayGoogle Scholar
  7. 7.
    Zhang J, Zulkernine M (2006) Anomaly based network intrusion detection with unsupervised outlier detection. In Proceedings of IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, pp 2388–2393Google Scholar
  8. 8.
    Ferdousi Z, Maeda A (2006) Unsupervised outlier detection in time series data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW06), Atlanta, GA, USA, AprGoogle Scholar
  9. 9.
    Sheng B, Li Q, Mao W, Jin W (2007) Outlier detection in sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc07), Montreal, Quebec, Canada, pp 219–228Google Scholar
  10. 10.
    Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large datasets. In Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data, Dallas, Texas, USA, pp 427–438Google Scholar
  11. 11.
    Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In Proceedings of the 24th international Conference on Very Large Data Bases (VLDB98), New York, NY, USA, pp 392–403Google Scholar
  12. 12.
    Knorr EM, Ng RT (1999) Finding intensional knowledge of distance-based outliers. In Proceedings of the 25th international Conference on Very Large Data Bases (VLDB99), Edinburgh, Scotland, UK, pp 211–222Google Scholar
  13. 13.
    Li W, Parker J, Joshi A (2008) Security through collaboration in MANETs. In Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Springer LNICST vol. 10, Orlando, FL, USA, pp 696–714, NovemberGoogle Scholar
  14. 14.
    Li W, Joshi A (2009) Outlier detection in ad hoc networks using dempster-shafer theory. In Proceedings of the 10th International Conference on Mobile Data Management (MDM 2009), Taipei, Taiwan, pp 112–121, MayGoogle Scholar
  15. 15.
    Li W, Joshi A, Finin T (2009) Policy-based malicious peer detection in ad hoc networks. In Proceedings of 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), Vancouver, Canada, Vol. 3, pp 76–82, AugustGoogle Scholar
  16. 16.
    Branch J, Szymanski B, Giannella C, Wolff R, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS2006),Lisbon, PortugalGoogle Scholar
  17. 17.
    Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. ACM SIGMOD Record 32(4):77–82CrossRefGoogle Scholar
  18. 18.
    Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd international Conference on Very Large Data Bases (VLDB06), Seoul, Korea, pp 187–198Google Scholar
  19. 19.
    Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 255–265Google Scholar
  20. 20.
    Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceeding of the 2006 Workshop on Game theory For Communications and Networks (GAMENET06), Pisa, ItalyGoogle Scholar
  21. 21.
    Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 275–283Google Scholar
  22. 22.
    DengH, Zeng Q, Agrawal DP (2003) SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC03), vol. 3, pp 2147–2151, Orlando, FL, USAGoogle Scholar
  23. 23.
    Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pp 153–158, Kyoto, JapanGoogle Scholar
  24. 24.
    Tseng C, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03), Fairfax, VA, USA, pp 125–134Google Scholar
  25. 25.
    Huang Y, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), Fairfax, VA, USA, pp 135–147Google Scholar
  26. 26.
    Kefayati M, Rabiee HR, Miremadi SG, Khonsari A (2006) Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp 91–100Google Scholar
  27. 27.
    Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp 245–259Google Scholar
  28. 28.
  29. 29.
    Parker J, Patwardhan A, Joshi A (2006) Cross-layer analysis for detecting wireless misbehavior. In Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006), Las Vegas, Nevada, USA, JanGoogle Scholar
  30. 30.
    He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad hoc networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, pp 825–830Google Scholar
  31. 31.
    Patwardhan A, Perich F, Joshi A, Finin T, Yesha Y (2005) Active collaborations for trustworthy data management in ad hoc networks. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, NovemberGoogle Scholar
  32. 32.
    Srinivasan V, Nuggehalli P, Chiasserini C-F, Rao RR (2005) An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Trans Wireless Commun 4(2):722–733CrossRefGoogle Scholar
  33. 33.
    Buchegger S, Boudec J-YL (2003) A robust reputation system for mobile ad-hoc networks. In Proceedings of P2PEconGoogle Scholar
  34. 34.
    Griffiths N (2005) Task delegation using experience-based multi-dimensional trust. In Proceedings of the Fourth international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 05), pp 489–496, The Netherlands, JulyGoogle Scholar
  35. 35.
    Reece S, Rogers A, Roberts S, Jennings NR (2007) Rumors and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In Proceedings of the 6th international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 07), pp 1–8, Honolulu, Hawaii, USA MayGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Department of Computer Science and Electrical EngineeringUniversity of Maryland, Baltimore County (UMBC)BaltimoreUSA

Personalised recommendations