Advertisement

Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience

  • Ning Jiang
  • Kien A. Hua
  • Mounir A. Tantaoui
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 162)

Abstract

In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services. Most of the contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is updated based on complicated trust relationships among hosts and other techniques to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address the aforementioned problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving nodes are penalized and circumvented by benign nodes within their localities based on first-hand experiences. This approach significantly simplifies the collaboration enforcement process, incurs very low overhead, and is robust against various evasive behaviors. Simulations based on various system configurations demonstrate that overall network performance is greatly enhanced.

Key words

Mobile Ad Hoc Network Collaboration enforcement Reputation First-hand experience 

References

  1. [1]
    B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. ACM Workshop on Wireless Security (WiSe) 2002.Google Scholar
  2. [2]
    S. Buchegger and J. L. Boudec, IBM Research Report: The Selfish Node: Increasing Routing Security in Mobile Ad Hoc Networks. RR 3354, 2001.Google Scholar
  3. [3]
    S. Buchegger and J. L. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness In Dynamic Ad Hoc Networks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.Google Scholar
  4. [4]
    S. Buchegger, H. L. Boudec, Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. EPFL Technical Report IC/2003/31.Google Scholar
  5. [5]
    L. Buttyan and J. Hubaux. Enforcing Service Availability in Mobile Ad Hoc WANs. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.Google Scholar
  6. [6]
    L. Buttyan and J. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report DSC/2001/046, EPFL-DI-ICA, August 2001.Google Scholar
  7. [7]
    Stephan Eidenbenz and Luzi Anderegg, Ad hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003), September 2003.Google Scholar
  8. [8]
    Y. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Technical Report TR01-383, Department of Computer Science, Rice University, December 2001.Google Scholar
  9. [9]
    Y. Hu, D. B. Johnson and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless AdHoc Networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE, Calicoon, NY, June 2002.Google Scholar
  10. [10]
    J. Hubaux, L. Buttyan, and S. Capkun. The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2001.Google Scholar
  11. [11]
    D. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. F. Korth, editors, Mobile Computing, pages 153–181. Kluwer Academic Publishers, Dordrecht, The Netherlands, 1996.Google Scholar
  12. [12]
    V. Kärpijoki, Security in Ad Hoc Networks. In Proceedings of the Helsinki University of Technology, Seminar on Network Security, 2000.Google Scholar
  13. [13]
    S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of MOBICOM 2000, pages 255–265, 2000.Google Scholar
  14. [14]
    P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002), Portoroz, Slovenia, 2002.Google Scholar
  15. [15]
    P. Michiardi and R. Molva. Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks. Research Report No RR-02-63. January 2002.Google Scholar
  16. [16]
    P. Michiardi, R. Molva. Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference, 2002.Google Scholar
  17. [17]
    X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A library for parallel simulation of large-scale wireless networks. Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS’ 98), May 26–29, in Banff, Alberta, Canada, 1998.Google Scholar
  18. [18]
    Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Networks. In Proceedings of MOBICOM 2000, pages 275–283, 2000.Google Scholar
  19. [19]
    L. Zhou and Z. Haas. Securing Ad Hoc Networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December, pages 24–30, 1999.Google Scholar
  20. [20]
    Sheng Zhong, Jiang Chen, Yang Richard Yang, Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc networks. IEEE INFOCOM 2003.Google Scholar
  21. [21]
    ANSI/IEEE Standard 802.11, 1999 Edition. 1999. http://standards.ieee.org/catalog/olis/lanman.html.Google Scholar
  22. [22]
    Information Technology Laboratory, National Institute of Standards and Technology. The Keyed-Hash Message Authentication Code (HMAC).Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Ning Jiang
    • 1
  • Kien A. Hua
    • 1
  • Mounir A. Tantaoui
    • 1
  1. 1.School of Computer ScienceUniversity of Central FloridaOrlando

Personalised recommendations