본문 바로가기
HOME> 논문 > 논문 검색상세

논문 상세정보

Journal of communications and networks   v.18 no.6, 2016년, pp.938 - 947   SCIE
본 등재정보는 저널의 등재정보를 참고하여 보여주는 베타서비스로 정확한 논문의 등재여부는 등재기관에 확인하시기 바랍니다.

Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks

Anand, Anjali   (Department of Computer Engineering, Punjabi University  ); Aggarwal, Himanshu   (Department of Computer Engineering, Punjabi University  ); Rani, Rinkle   (Computer Science and Engineering Department, Thapar University  );
  • 초록

    A mobile ad hoc network (MANET) is a collection of mobile nodes communicating in an infrastructure-less environment without the aid of a central administrating authority. Such networks entail greater dependency on synergy amongst the nodes to execute fundamental network operations. The scarcity of resources makes it economically logical for nodes to misbehave to preserve their resources which makes secure routing difficult to achieve. To ensure secure routing a mechanism is required to discourage misbehavior and maintain the synergy in the network. The proposed scheme employs a partially distributed dynamic model at each node for enhancing the security of the network. Supplementary information regarding misbehavior in the network is partially distributed among the nodes during route establishment which is used as a cautionary measure to ensure secure routing. The proposed scheme contemplates the real world scenario where a node may exhibit different kinds of misbehavior at different times. Thus, it provides a dynamic decision making procedure to deal with nodes exhibiting varying misbehaviors in accordance to their severity. Simulations conducted to evaluate the performance of the model demonstrate its effectiveness in dealing with misbehaving nodes.


  • 주제어

    Mobile ad hoc network (MANET) security  . misbehaving node  . reputation based scheme  . routing misbehavior  . secure routing  .

  • 참고문헌 (29)

    1. A. Konig, D. Seither, R. Steinmetz, and M. Hollick, "An analytical model of routing, misbehavior and countermeasures in mobile ad hoc networks," in Proc. IEEE GLOBECOM, Nov.-Dec. 2009, pp. 1-6. 
    2. R. Nath, P. K. Sehgal, and A.K. Sethi "Effect of routing misbehavior in mobile ad hoc network," in Proc. IEEE IACC, Feb. 2010, pp. 218-222. 
    3. A. Visconti and H. Tahayori, "Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets," in Proc. IEEE ICITST, Nov. 2009, pp. 1-2. 
    4. V. N. Patil and S. A. Thorat, "Cross layer approach to detect malicious node in MANET," in Proc. IEEE ICCCNT, July 2013, pp. 1-6. 
    5. C. Shi-Hong, L. Chi-Chun, and H. Chun-Chieh, "Mitigating routing misbehavior in dynamic source routing protocol using trust-based reputation mechanism for wireless ad-hoc networks," in Proc. IEEE ICCNC, Jan. 2011, pp. 442-446. 
    6. S. Usha and S. Radha, "Co-operative approach to detect misbehaving nodes in MANET using multi-hop acknowledgement scheme," in Proc. ICACCTT, Dec. 2009, pp. 576-578. 
    7. S. N. Pari and D. Sridharan, "Mitigating routing misbehavior in self organizing mobile ad hoc network using K-neighbourhood local reputation system," in Proc. IEEE ICRTIT, June 2008, pp. 313-317. 
    8. T. Elissa, S. A. Razak, R. H. Khokhar, and N. Samian, "Trust-based routing mechanism in MANET: Design and implementation," Mobile Netw. Appl., vol. 18, no. 5 pp. 666-677, Oct. 2013. 
    9. X.Mao and J.McNair, "Effect of on/off misbehavior on overhearing based cooperation scheme for MANET," in Proc. IEEE MILCOM, Oct.-Nov. 2010, pp. 1086-1091. 
    10. L. Buttyan and J. P. Hubaux, "Enforcing service availability in mobile adhoc WANs," in Proc. ACM MOBICOM, Nov. 2000, pp. 87-96. 
    11. S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof credit-based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, Mar.-Apr. 2003, pp. 1987-1997. 
    12. L. Buttyan and J. P. Hubaux, "Stimulating cooperation in self-organizing ad hoc networks," Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, Oct. 2008. 
    13. H. Janzadeh, K. Fayazbaksh, M. Dehghan, and M. S. Fallah, "A secure credit-based cooperation stimulating mechanism for MANETs using hash chains," Future Gen. Comp. Syst., vol. 25, no. 8, pp. 926-934, Sept. 2009. 
    14. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Tech. Rep., Stanford University, June 2003. 
    15. J. Hu and M. Burmester, "LARS: A locally aware reputation system for mobile ad hoc networks," in Proc. ACM-SE, Mar. 2006, pp. 119-123. 
    16. S. Buchegger and J. Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in Proc. MobiHoc, June 2002, pp. 226-236. 
    17. P.Michiardi and R.Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks," in Advanced Communications and Multimedia Security, US: Springer, 2002, pp. 107-121. 
    18. J. N. Al-Karaki and A. E. Kamal, "Stimulating node cooperation in mobile ad hoc networks," Wireless Pers. Commun., vol. 44, no. 6, pp. 219-239, Jan. 2008. 
    19. K. Gopalakrishnan and R. Uthariaraj, "Local monitoring based reputation system with alert to mitigate the misbehaving nodes in mobile ad hoc networks," in Proc. ICT, Sept. 2010, pp. 344-349. 
    20. M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadeem, "Adaptation of reputation management systems to dynamic network conditions in ad hoc networks," IEEE Trans. Comput., vol. 59, no. 5 pp. 707-719, Feb. 2010. 
    21. T. Chen, F. Wu, and S. Zhong, "FITS: A finite-time reputation system for cooperation in wireless ad hoc networks," IEEE Trans. Comput., vol. 60, no. 7 pp. 1045-1056, July 2011. 
    22. S. Noorian, M. Noorian, M. Fleming, and S. Marsh, "A strategic reputation-based mechanism for mobile ad hoc networks," in Proc. CCAI, May 2012, pp. 145-157. 
    23. X. Gu, P. Lin, and S. Shi, "A novel reputation model based on subjective logic for mobile ad hoc networks," in Proc. ICTCS, pp. 525-532. 
    24. T. Changgeng, C. Songqiao, and L. Wenyan, "An optimal local reputation system in mobile ad hoc networks," in Proc. IEEE ICYCS, Nov. 2008, pp. 588-593. 
    25. S. JianHua and M. ChuanXiang, "A reputation-based scheme against malicious packet dropping for mobile ad hoc networks," in Proc. IEEE ICICIS, Nov. 2009, pp. 113-117. 
    26. R. Talreja and V. Jethani, "A vote based system to detect misbehaving nodes in MANETs," in Proc. IEEE IACC, Feb. 2014, pp. 391-394. 
    27. T. Issariyakul and E. Hossain, Introduction to network simulator NS2, 2nd ed. USA: Springer, 2009. 
    28. D. Goldschlag, M. Reed, and P. Syverson, "Onion routing", Commun. ACM, vol. 42, no. 2 pp. 39-41, Feb. 1999. 
    29. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router" in Proc. USENIX Security, 2004, pp. 21-21. 

 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역

원문보기

무료다운로드
유료다운로드

유료 다운로드의 경우 해당 사이트의 정책에 따라 신규 회원가입, 로그인, 유료 구매 등이 필요할 수 있습니다. 해당 사이트에서 발생하는 귀하의 모든 정보활동은 NDSL의 서비스 정책과 무관합니다.

NDSL에서는 해당 원문을 복사서비스하고 있습니다. 위의 원문복사신청 또는 장바구니 담기를 통하여 원문복사서비스 이용이 가능합니다.

이 논문과 함께 출판된 논문 + 더보기