A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

Similar documents
CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

Webpage: Volume 4, Issue VI, June 2016 ISSN

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

International Journal of Advance Research in Computer Science and Management Studies

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

CAODV Free Blackhole Attack in Ad Hoc Networks

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

Trust4All: a Trustworthy Middleware Platform for Component Software

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

A Study on Issues Associated with Mobile Network

Presentation Structure

Centralized System in MANET with GRP Protocol

Performance Evaluation of AODV and DSR routing protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Scheme of Multi-path Adaptive Load Balancing in MANETs

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

SUMMERY, CONCLUSIONS AND FUTURE WORK

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

AWERProcedia Information Technology & Computer Science

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

High Efficient Broadcasting Protocols for Mobile ADHOC Network

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography

Distributed AAA: Proposals for Ad Hoc Networks

Improving Probability Expectation Definition in Subjective Logic

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Figure 1: Ad-Hoc routing protocols.

Heuristic Clustering Algorithms in Ad hoc Networks

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

Routing Protocols in MANET: Comparative Study

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Enhancing Security in MANET Using CCRVC Scheme

Improving Energy and Efficiency in cluster based VANETs through AODV Protocol

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Ad hoc and Sensor Networks Chapter 3: Network architecture

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

A New Efficient and Energy-aware Clustering Algorithm for the OLSR Protocol

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

CSMA based Medium Access Control for Wireless Sensor Network

Investigation on OLSR Routing Protocol Efficiency

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Implementation of Enhanced Certificate Revocation of Malicious Nodes in Mobile Adhoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

COOPERATION-AWARE TOPOLOGY CONTROL

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

Mitigating Superfluous Flooding of Control Packets MANET

Ad hoc and Sensor Networks Chapter 3: Network architecture

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

Adapting SIP for Enabling Voice Calls in MANET

Bee Inspired and Fuzzy Optimized AODV Routing Protocol

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Estimate the Routing Protocols for Internet of Things

Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India

Comparison of Various Routing Protocols & Brief of MANET

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

On the Scalability of Hierarchical Ad Hoc Wireless Networks

Addressing: when mobile is moving around. Mobile Registration. Principles of Mobile Routing. Mobility via Indirect Routing

Transcription:

5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks Azzedine Boukerche and Yonglin Ren School of Information Technology and Engineering (SITE) University of Ottawa Ottawa, Ontario, Canada Vancouver, BC, Canada October 27th, 2008

Outline Introduction Background Related Work Community Management Generalized Reputation Evaluation Model (GRE) Simulation and Evaluation Conclusion 2

Introduction Mobile Ad hoc Networks (MANETs) are emerging as a new form of wireless network, security support is indispensable for the potential applications of MANETs However, traditional security mechanisms in wired network are not suitable for MANETs, for example: firewall, access control, etc. - The lack of pre-deployed infrastructure - The low processing capability - The mobility of nodes - The short range of transmission 3

Introduction In the realm of network security, trust-based reputation appears as a new technique that is attracting more and more attention The traditional notion of reputation only indicates a belief or feeling regarding the behaviors of peers; whereas, the current notion of trust refers to the outcome of the observations of an expected action [1] In our research, we define the concept of trust as follows: it represents the degree to which a node should be trustworthy, secure, or reliable during any interaction with the node 4

Background Trust Relationship - Object and Subject one node, called the object, can forward packets for another node, called the subject - Let us assume a communication between nodes A and B, in which A is the subject and B is the object, then - The notation Trust (Subject, Object) indicates the mutual relationship established between node subject and node object - The trust of A to B is Trust (B, A) - The trust of B to A is Trust (A, B) A Subject B Object Subject and object 5

Background Thus, reputation can be used to evaluate other nodes ability to execute an expected action, and a node can take advantage of this reputation information to make decisions If the nodes behaviors have been faithful to the reputation evaluation system, then trust will increase between these entities. For instance, if node A successfully forwards a packet for B, then B thus increases its trust value Trust (B, A) for A s collaborative behavior; vice versa 6

Background In a wireless and mobile environment, when object is trustworthy enough for subject can the object participate in the communication initiated by that subject Additionally, if the subject trusts the object to perform the intended operation, the trust relationship between these two nodes is considered to be reliable from the communicating initiator s point of view Trust: Low A S R B Trust: High An example of trust-based communication 7

Related Work The trust and reputation techniques are widely applied in distributed systems, for example - Mitra et al. [2] focus on the issue of managing trust and incentives in a very large-scale environment - Klusch [3] proposes an agent-based technology to evaluate the users records to form their reputations - Selcuk et al. [1] design a reputation-based trust management protocol for peer-to-peer networks, which uses the ratings about users reliability as the criteria of trust evaluation 8

Related Work Reputation is also used in the process of data transmission and routing protocols in wireless and mobile networks - Brahim et al. [4] present a formal model for cooperative mobility that involves the cooperation models for reputation management - Kane and Browne [5] incorporate uncertainty into their reputation computation, such that uncertainty indicates that the local opinion of the node has not been sufficiently well-informed - Santi et al. [6] propose a framework to encourage selfish nodes to work for members of a network when the network is established 9

Community Management We introduce the concept of a distributed community: for a node that is a central node, we define this node and all of its one-hop neighboring nodes as a community - The central node is identical to other nodes in the network and owns the same processing capabilities - Due to the mobility of nodes in MANETs, every one-hop community has free memberships for mobile nodes - When a node, called the initiator, would like to communicate with another node, called the central node, it has to send a message to establish a link between them, which is equal to joining the central node s community 10

Community Management In our reputation evaluation system each node has its own community centered at itself - In the meantime, the initiator will include its public key in the joining message for the later authentication and key distribution - The central node then assigns a secret key to this newly joined node that only used for their communication - In order to distribute the secret key securely, the central node will encrypt it using the public key of the intended neighboring node before sending it - Thus, the central node generates different secret keys for different members 11

Generalized Reputation Evaluation Model (GRE) We propose a trust-based reputation model that will update the trust value based on different increase-shapes linear Logarithmic Exponential The trust increase shapes based on our reputation model 12

Generalized Reputation Evaluation Model (GRE) We use exponential function to describe the reputation increases of different nodes 18 16 14 12 10 8 6 4 2 0 0 0. 5 1 1. 5 2 2. 5 3 3. 5 4 An example of exponential function 13

Generalized Reputation Evaluation Model (GRE) We also use logarithmic function to describe the reputation increases of different nodes 2. 5 2 1. 5 1 0. 5 0 1 1. 5 2 2. 5 3 3. 5 4 4. 5 5 An example of logarithmic function 14

Generalized Reputation Evaluation Model (GRE) Finally, we use linear function to describe the reputation increases of different nodes as well 4. 5 4 3. 5 3 2. 5 2 1. 5 1 0. 5 0 0 0. 5 1 1. 5 2 2. 5 3 3. 5 4 An example of linear function 15

Generalized Reputation Evaluation Model (GRE) We propose a reputation evaluation theory that will evaluate the trust value of the node n based on different increase-shapes - If the node n has a good trust record in the past, then its current trust will increase more quickly - If the node n has fewer trust credits due to less contributions, its current trust will increase slowly - If the node n has a medium trust record, its current trust will increase moderately as well 16

Generalized Reputation Evaluation Model (GRE) A factor recent trust (rt) is introduced to record the past behaviors of n, since recent trust (rt) will increase if node n contributes more, or decreases with a lesser contribution ω = α rt This will yield a value very close to 1 for nodes with a moderate recent trust (rt = 0.5), a value below 1 for nodes that have lower recent trust (rt < 0.5), and a value above 1 for nodes that have a higher recent trust (rt > 0.5) 17

Generalized Reputation Evaluation Model (GRE) Another factor recent activities (ra) is introduced, which indicates a successful forwarding, etc. β = κ T ra - T measures the time that the node n stays in the community κ - is a discount factor between 0 and 1 18

Generalized Reputation Evaluation Model (GRE) Finally, trust is evaluated as follows: Trust (1+ 1 ω = λ 1 ω β ) - λ is a scaling factor to keep the Trust at a value between 0 and 1 - Thus, the evaluation of trust is defined as a function that depends on both the time that a node has stayed in the community and the past trust that this node has achieved in recent periods 19

Generalized Reputation Evaluation Model (GRE) As for the maintenance of the community, our scheme employs a method similar to that used by the AODV routing protocol [7], which will broadcast HELLO messages periodically from the central node The central node updates the trust value each time based on the HELLO messages, and updates other variables in the aforementioned trust computation model as well Through introducing our reputation model, which is not complicated but remains efficient, GRE can be suitable for mobile environments 20

Simulation and Evaluation We evaluate our GRE model based on a set of extensive simulation experiments using the Network Simulator ns-2 within a wireless and mobile network Our experiments have two purposes: - Verify if the established reputation model works as we predict in the simulation - Examine the overhead spent on reputation evaluation and the packet numbers of our scheme, based on a comparison 21

Simulation and Evaluation We compare GRE with the already accepted reputation evaluation method [8], which mainly uses the group-based mechanism to manage nodes and a linear trust computation approach to evaluate the reputation of each node in a wireless context We refer to this model as group-based model In this model, nodes are grouped into High, Medium and Low trust groups and their trust changes will be evaluated based on a linear function, which can realistically reflect the basic reputation schemes according to most of these systems 22

Simulation and Evaluation The average change tendencies of reputation evaluation based on different types of nodes Trust Value 0.36 0.33 0.3 0.27 0.24 0.21 GRE Group-based - Our GRE model has a slower increase in reputation evaluation for the nodes with low initial trust values - Similarly, for the nodes with high initial trust values, they will have a quick increase in reputation evaluation based on our GRE model Trust Value 0.18 0.8 0.65 0.5 0.35 0.2 0.05 6% 8% 10% 12% 14% 16% 18% 20% Percentage of Packets GRE Group-based 6% 8% 10% 12% 14% 16% 18% 20% Percentage of Packets Average reputation changes of GRE vs. the groupbased system 23

Simulation and Evaluation A comparison between the group-based model and GRE - GRE has a lower security overhead used for the community management than that of the group-based trust system GRE Group-based Security Overhead (%) 35% 30% 25% 20% 15% 10% 5% 0% 5 10 15 20 25 30 Number of Nodes Security overhead of GRE vs. group-based system 24

Conclusion We introduce the concept of community which uses a distributed way to manage nodes in MANETs dynamically We also introduce a novel computational model of trust-based reputation evaluation that can calculate efficiently the trustworthiness of wireless and mobile devices We evaluate the performance of our scheme based on an extensive set of simulation experiments and demonstrate that our GRE system has a better performance when compared to other traditional schemes In the future work, we will explore the applications of our reputation model in different aspects of mobile security 25

Reference [1] A. A. Selcuk, E. Uzun, and M. R. Pariente, A reputation-based trust management system for P2P networks, Proceedings of International Symposium on Cluster Computing and the Grid, 2004, pp. 251 258. [2] A. Mitra, R. Udupa, and M. Maheswaran, A secured hierarchical trust management framework for public computing utilities, Proceedings of the conference of the Centre for Advanced Studies on Collaborative research, 2005, pp. 185 199. [3] M. Klusch, Information agent technology for the Internet: A survey, Data and Knowledge Engineering, Vol. 36, 2001, pp. 337 372. [4] G. B.Brahim, A.-f. Ala, D. Kountanis, and B. Khan, A new fuzzy-based cooperative movement model in support of QoS in wireless ad-hoc network, Proceedings of International Conference on wireless communications and mobile computing, 2007, pp. 158 163. [5] K. Kane, and J. C. Browne, Using uncertainty in reputation methods to enforce cooperation in adhoc networks, Proceedings of the 5th ACM workshop on wireless security, 2006, pp. 105 113. [6] P. Santi, S. Eidenbenz, and G. Resta, A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks, Proceedings of the workshop on dependability issues in wireless ad hoc networks and sensor networks, 2006, pp. 9 18. [7] C. E. Perkins and M. E. Royer, Ad hoc on demand distance vector (AODV) routing, IETF Internet Draft, www.ietf.org, 1997. [8] J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, Group management for mobile Ad Hoc networks: design, implementation and experiment, Proceedings of the 6th conference on Mobile Data Management, 2005, pp. 47 54. 26

Thank you! 27