Skip to main content

An Analytical Modeling for Boosting Malicious Mobile Agent Participation in Mobile Adhoc Network

  • Conference paper
  • First Online:
Intelligent Systems Applications in Software Engineering (CoMeSySo 2019 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1046))

Included in the following conference series:

  • 499 Accesses

Abstract

The contribution of mobile agents in existing wireless network is basically to cater up the connectivity demands. However, adoption of mobile agents in decentralized system like Mobile Adhoc Network (MANET) is found to be highly vulnerable where there is few evidence of offering security legitimacy of services offered by mobile agents. The security problem becomes highly challenging if adversary dynamically alters the attack tactics. Therefore, the proposed system introduces a novel analytical model which is capable of capturing the malicious behavior of mobile agent and quarantines them from further spreading the intrusion. Utilizing probability modeling, the proposed system introduces a resistance on the basis of intensive evaluation of local and global trust. The study outcome of proposed system shows that it offers better communication performance along with security in contrast to existing communication scheme in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cooper, C.: Apples cook: 172 million post-PC devices in the last year. Technical report, CNET, New York, NY, USA, March 2012

    Google Scholar 

  2. Sarkar, S., Datta, R.: Mobility-aware route selection technique for mobile ad hoc networks. IET Wirel. Sens. Syst. 7(3), 55–64 (2017)

    Article  Google Scholar 

  3. Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8(3), 253–266 (2010)

    Article  Google Scholar 

  4. Marwaha, S., Tham, C.K., Srinivasan, D.: Mobile agents based routing protocol for mobile ad hoc networks. In: Global Telecommunications Conference, GLOBECOM 2002, vol. 1, pp. 163–167. IEEE, Taipei (2002)

    Google Scholar 

  5. Channappagoudar, M.B., Venkataram, P.: Mobile agent based node monitoring protocol for MANETs. In: 2013 National Conference on Communications (NCC), New Delhi, India, pp. 1–5 (2013)

    Google Scholar 

  6. Rohankar, R.: Agent based predictive data collection in opportunistic wireless sensor network. Procedia Comput. Sci. 57, 33–40 (2015)

    Article  Google Scholar 

  7. Halim, I.T.A., Hossam, M.A., Fahmy, A.M.B., El-Shafey, M.H.: Agent-based trusted on-demand routing protocol for mobile ad hoc networks. In: 2010 Fourth International Conference on Network and System Security, pp. 255–262. IEEE (2010)

    Google Scholar 

  8. Abosamra, A., Hashem, M., Darwish, G.: Securing DSR with mobile agents in wireless ad hoc networks. Egyptian Inf. J. 12(1), 29–36 (2011)

    Article  Google Scholar 

  9. García-Magariño, I., Lacuesta, R., Lloret, J.: Agent-based simulation of smart beds with Internet-of-Things for exploring big data analytics. IEEE Access 6, 366–379 (2018)

    Article  Google Scholar 

  10. Fortino, G., Russo, W., Savaglio, C., Shen, W., Zhou, M.: Agent-oriented cooperative smart objects: from IoT system design to implementation. IEEE Trans. Syst. Man Cybern.: Syst. 99, 1–18 (2017)

    Google Scholar 

  11. Wang, N., Li, J.: Shortest path routing with risk control for compromised wireless sensor networks. IEEE Access 7, 19303–19311 (2019)

    Article  Google Scholar 

  12. Gargees, R.S., Scott, G.J.: Dynamically scalable distributed virtual framework based on agents and pub/sub pattern for IoT media data. IEEE IoT J. 6(1), 599–613 (2019)

    Google Scholar 

  13. Quan, Y., Chen, W., Zhihai, W., Peng, L.: Distributed fault detection for second-order delayed multi-agent systems with adversaries. IEEE Access 5, 16478–16483 (2017)

    Article  Google Scholar 

  14. Wang, D., Wang, W.: Distributed fault detection and isolation for discrete time multi-agent systems. In: Computational Intelligence, Networked Systems and Their Applications, pp. 496–505. Springer, Berlin (2014)

    Google Scholar 

  15. Harrabi, S., Jaafar, I.B., Ghedira, K.: Message dissemination in vehicular networks on the basis of agent technology. Wirel. Pers. Commun. 96(4), 6129–6146 (2017)

    Article  Google Scholar 

  16. Fortino, G., Gravina, R., Russo, W., Savaglio, C.: Modeling and simulating Internet-of-Things systems: a hybrid agent-oriented approach. Comput. Sci. Eng. 19(5), 68–76 (2017)

    Article  Google Scholar 

  17. Santos, J., Rodrigues, J.J., Casal, J., Saleem, K., Denisov, V.: Intelligent personal assistants based on internet of things approaches. IEEE Syst. J. 12(2), 1793–1802 (2018)

    Article  Google Scholar 

  18. Shehada, D., Yeun, C.Y., Zemerly, M.J., Al-Qutayri, M., Al-Hammadi, Y., Hu, J.: A new adaptive trust and reputation model for mobile agent systems. J. Netw. Comput. Appl. 124, 33–43 (2018)

    Article  Google Scholar 

  19. Hsieh, H.-C., Chang, K.-D., Wang, L.-F., Chen, J.-L., Chao, H.-C.: ScriptIoT: a script framework for and internet-of-things applications. IEEE IoT J. 3(4), 628–636 (2015)

    Google Scholar 

  20. Lu, S., Li, L., Lam, K., Jia, L.: SAODV: a MANET routing protocol that can withstand black hole attack. In: 2009 International Conference on Computational Intelligence and Security, Beijing, pp. 421–425 (2009)

    Google Scholar 

  21. Papadimitratos, P., Haas, Z.J.: Secure link state routing for mobile ad hoc networks. In: Proceedings of 2003 Symposium on Applications and the Internet Workshops, Orlando, FL, USA, pp. 379–383 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. K. Chethan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chethan, B.K., Siddappa, M., Jayanna, H.S. (2019). An Analytical Modeling for Boosting Malicious Mobile Agent Participation in Mobile Adhoc Network. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Intelligent Systems Applications in Software Engineering. CoMeSySo 2019 2019. Advances in Intelligent Systems and Computing, vol 1046. Springer, Cham. https://doi.org/10.1007/978-3-030-30329-7_25

Download citation

Publish with us

Policies and ethics