Data delivery in Mobile Adhoc Networks
(MANETs) gets adversely affected by various malicious
attacks. Detection of malicious presence, therefore, becomes
important to improve MANET's performance. In this paper
probabilistic models have been proposed to characterize
random behavior of nodes for Selfish Behavior (SB) attacks.
This attack makes nodes unavailable for data forwarding,
resulting in increased blocking tendency of the network.
Quantification of network blocking probabilities has been
proposed. This can then be further used for making
appropriate trustworthiness related decisions for nodes,
leading to improvement in MANET’s performance, using
suitable routing protocols.
Published In:IJCSN Journal Volume 5, Issue 4
Date of Publication : August 2016
Pages : 653-660
Figures :06
Tables : --
Kirti Aniruddha Adoni : is presently working as Assistant
Professor at P.E.S. Modern College of Engineering, Shivajinagar,
Pune, India 411005. She is a Research Student of Electronics
and Telecommunication department, V.I.I.T. Research Centre,
Kondhwa, Pune, India. She has completed her M.Tech
(Microwave) from College of Engineering, Pune, Maharashtra,
India in 2010. Her major fields of study are wireless networks,
mobile ad-hoc networks.
Dr. Anil S. Tavildar : is working as Professor Emeritus in
Electronics and Telecommunication Engineering at MKSSS’s
Cummins college of Engineering, Pune, India. He has obtained his
B.E. (Electronics and Telecommunication Engineering) from
University of Pune and PhD (Communication Engineering) from
Indian Institute of Technology, Delhi in 1984. He has 28 years of
industrial, research and development experience and 16 years of
teaching experience. His research interests are in signal
processing, wireless and mobile communication systems. Prof
Tavildar is Senior Member, IEEE USA, Fellow Member of IETE,
India, Founder Member ICIET and Life Member of ISTE, India.
Probabilistic Models, Selfish Behavior Attack,
Probability of Blocking, MANETs
Maliciousness due to SB attack, has been modeled using
uniformly distributed continuous time random variables,
Poisson and uniformly distributed discrete values for ONOFF
pulses 'k' and binomially distributed number of
malicious nodes 'n' of the network. Formulation for
probability of network blocking for individual nodes Pbj
and total network blocking probability, PB, based on
concept of statistical averaging have been proposed.
MATLAB based simulations on typical MANET network
of fifty nodes, indicate that blocking probability is
maximum around k=2 and it saturates for higher values of
'k' for uniform distribution.
In the above analysis the basic occurrence of random time
for ON-OFF switching of nodes has been assumed to be
uniformly distributed in available time. However, any
other continuous time distributions like, Gaussian,
Lognormal, Exponential distribution etc. may also be used
in modeling. The analysis can be carried out, using the
similar approach.
[1] M. Abolhasan, T. Wysocki, E. Dutkiewicz, “A review
of routing protocols for mobile ad hoc networks”, Ad
Hoc Networks, 1570-8705 2 (1) (2004) 1–22.
[2] Charles E. Perkins, PravinBhagwat, “Highly Dynamic
Destination-Sequenced Distance-Vector Routing
(DSDV) for Mobile Computers”
[3] T. Clausen, P. Jacquet, IETF RFC-3626: “Optimized
Link State Routing Protocol OLSR”, 2003.
[4] Charles E. Perkins, Elizabeth M. Royer, “Ad-hoc Ondemand
Distance Vector Routing”
[5] D. B. Johnson and D.A. Maltz, “Dynamic Sources
Routing in Ad hoc Wireless Networks”, Mobile
Computing, 1996.
[6] I. ChakeresCenGen, C. Perkins WiChorus, “Dynamic
MANET On-demand Routing draft-ietf-manet-dymo-
17”, 2009.
[7] LoayAbusalah, AshfaqKhokhar and Mohsen Guizani,
“A Survey of Secure Mobile Ad Hoc Routing
Protocols”, IEEE Communications Surveys and
Tutorials, vol.1, no.4, Fourth Quarter 2008.
[8] Jian Wang, Yanheng Liu, Yu Jiao, “Building a trusted
route in a mobile ad hoc network considering
Communication reliability and path length”, Journal of
Network and Computer Applications, 34(2011),
pp.1138-1149.
[9] Candolin C, Kari H. “A security architecture for
wireless ad hoc networks”, In: Proceedings of
International Conference on mobile computing and
networking (MOBICOM’02): October 2002,1095-100.
[10] Pirzada AA, McDonald C., “Establishing trust in pure
ad-hoc networks” In: Proceedings of Australian
Conference on Computer Science, vol.56; January
2004, pp. 47-54.
[11] Anantvalee T., Wu J., “Reputation-based system for
encouraging the cooperation of nodes in mobile ad-hoc
networks”, In: Proceedings of IEEE International
Conference on the communication (ICC’07): June
2007, pp 3383-8.
[12] Peng SC, Jia WJ, Wang GJ, WU J, Guo MY, “Trusted
Routing Based on Dynamic Trust Mechanism in
Mobile Ad Hoc Networks.”,IEICE TRANSACTIONS
on Information and Sysytems E93-D 2010(3):510-7.
[13] AsmaAdnane , Christophe Bidan , Rafael Timóteo de
Sousa Júnior, “ Trust-based security for the OLSR
routing protocol” , Computer Communications, 36
(2013) 1159–1171 [14] S. Buchegger, J-Y. Le Boudec, “Performance analysis
of the confidant protocol : cooperation of nodes –
fairness. Dynamic Ad-hoc networks” , Proceedings of
IEEE/ACM Symposium on Mobile Ad Hoc
Networking and Computing (MobiHOC), IEEE, 2002.
[15] P. Michiardi, R. Molva, “Core: a collaborative
reputation mechanism to enforce node cooperation in
mobile ad hoc networks”, in: IFIP TC6/TC11 Sixth
Joint Working Conference on Communications and
Multimedia Security: Advanced Communications and
Multimedia Security, 2002, pp. 107–121.
[16] K. Meka, M. Virendra, S. Upadhyaya, “Trust based
routing decisions in mobile adhocNetworks”,
in:Workshop on Secure Knowledge Management
(SKM), 2006.
[17] Hui Xia, ZhipingJia, Xin Li, Lei Ju,Edwin H.-M. Sha,
“Trust prediction and trust-based source routing in
mobile ad hoc networks”, Ad Hoc Networks, 11 (2013)
pp. 2096-2114.
[18] Ing-Ray Chen, JiaGuo, FenyoBao, Jin-Hee Cho, “Trust
management in mobile ad hoc networks for bias
minimization and application performance
maximization”, Ad Hoc Networks 19 (2014) pp. 59-74.
[19] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker,
“Mitigating Routing Misbehavior in Mobile Ad Hoc
Networks”, In: Proceedings of international conference
on mobile computing and
networking(MOBICOM’00):August 2000, pp. 255-65.
[20] Zouridaki. C, Mark. B.L., Hejmo.M and Thomas.R.K.,
“A quantitative trust establishment framework for
reliable data packet delivery in MANETs”,
Proceedings of the 3rd ACM workshop on security of
adhoc and sensor networks, vol1, pp.1-10,(2005)
[21] Md. Amir KhusruAkhtar and Sahoo.G, “Mathematical
Model for the detection of selfish Nodes in MANETs”,
International Journal of Computer science and
Informatics, 2231-5292, vol 1(3), pp25-28(2011)
[22] J. SengathirR. And Manoharan, “Selfish Conscious
Mathematical Model based on Reliable Conditional
Survivability Co-efficient in MANET Routing”,
Proceedings of International Conference on Advances
Information Technology and Mobile Communication
(2013)
[23] Syed S. Rizvi and Khaled M. Elleithy, “A New
Scheme for minimizing malicious behavior of mobile
nodes in Mobile Ad Hoc Networks”, IJCSIS
International Journal of Computer science and
Information Security, vol.3, no.1,(2009)
[24] Hernandez-Orallo, Manuel.D, Serraty, Juan-Carlos
Cano, Calafate.T and Manzoni’s, “ Improving Selfish
Node Detection in MANETs Using a collaborative
Watchdog”, IEEE Communication Letters, vol.16,
no.5, (2012)
[25] Buchegger S., Boudec J.L., “A Robust reputation
system for P2P and mobile ad hoc networks”, In
Proceedings 2nd Workshop on economics of Peer to
Peer system(2004)
[26] Kirti A. Adoni, MandarKaryakarte, Anil Tavildar,
“Security Enhancement in OLSR protocol using Trust
Aware Routing Framework” in proceedings of ICEIT
conference on Advances in Mobile Communications,
Networking and Computing, April 2015, pp. 84-87.
[27] A. Rajaram and Dr. S. Palaniswami, “Malicious node
detection System for Mobile Ad hoc Networks”,
IJCSIT International Journal of Computer Science and
Information Technologies, vol.1 (2), pp.77-85(2010)
[28] Cheny and Zhao Q. (2005) on the lifetime of wireless
sensor networks, IEEE Communications Letters,
9(11):976-978.
[29] “Probability, Random Variables and Stochastic
Processes” A Papoulis, S. UnnikrishnanPillai, TMH,
Fourth Edition.