A reactive algorithm for deducing nodal forwarding behavior in a multihop ad hoc wireless network in the presence of errors

Authors

Abstract

A novel algorithm is presented to deduce individual nodal forwarding behavior from standard end to end acknowledgments. The algorithm is based on a well-established mathematical method and is robust to network related errors and nodal behavior changes. The proposed solution was verified in a network simulation, in which it performed well in a difficult environment and achieved sound results.

References

Z. Li and H. Shen, “Analysis the cooperation strategies in mobile adhoc networks”, Proc. MASS 2008, Atlanta, GA, Oct. 2008

L. Buttyan and J-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks”, ACM J. Mobile Networks(MONET), special issue on Mobile Ad Hoc Networks, 2002.

K. Hoffman, D. Zage and C. Nita-Rotaru, “A survey of attack anddefense techniques for reputation systems”, ACM Computing Surveys,vol. 42, issue 1, Dec. 2009.

J. Konorski and K. Rydzewski, “Guessing Intrinsic Forwarding Trust-worthiness of MANET Nodes from End to End Packet Delivery”, EAIADHOCNETS 2019, Queenstown, New Zealand, Nov 2019.

S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CON-FIDANT protocol”, Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw.Comput., Lausanne, Switzerland, pp. 226-236, 2002.

P. Michiardi and R. Molva, “CORE: A collaborative reputation mech-anism to enforce node cooperation in mobile ad hoc networks,” Proc.6th IFIP Comm. and Multimedia Security Conf., Portoroz, Slovenia, pp.107-121, 2002.

S. Gupta and C. Kumar, “An intelligent efficient secure routing protocolfor MANET”, Int. J. Future Generation Communication and Network-ing, vol. 6, no. 1, pp. 111-131, Feb. 2013.

M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadjem, “Adaptationof reputation management systems to dynamic network conditions in adhoc networks”, IEEE Trans. Computers, vol. 59, no. 5, pp. 707-719,May 2010.

E. Chiejina, H. Xiao and B. Christianson, “A Dynamic ReputationManagement System for Mobile Ad Hoc Networks”, Computers 4(2):87-112, 2015.

J. H. Saltzer, D. P. Reed, and D. D. Clark, ”End-to-End Argumentsin System Design”, ACM Transactions on Computer Systems 2.4, pp.277-288, 1984.

M.A. Paracha, S. Ahmad, A. Akram and M.W. Anwar, “CooperativeReputation Index Based Selfish Node Detection and Prevention Systemfor Mobile Ad hoc Networks”, Research Journal of Applied Sciences,Engineering and Technology 4(3):201-205, April 2012.

K. Gopalakrishnan and V.R. Uthariaraj, “Acknowledgment based Repu-tation Mechanism to Mitigate the Node Misbehavior in Mobile Ad HocNetworks”, Journal of Computer Science 7 (8): 1157-1166, 2011.

Y. Zhang, L. Lazos and W.J. Kozma, “AMD: Audit-Based MisbehaviorDetection in Wireless Ad Hoc Networks”, IEEE Transactions on MobileComputing, vol. 15, no. 8, Aug 2016.

K. Graffi, P. S. Mogre, M. Hollick, and R. Steinmetz, “Detection ofcolluding misbehaving nodes in mobile ad hoc and wireless meshnetworks”, Proc. IEEE GLOBECOM, Washington DC, Nov. 2007.

S. Sivanantham, K. Kirankumar and V. Akshaya, “Detection and Avoid-ance of Intrusion, Packet Drop and Modification in WSN”, InternationalJournal of Advanced Research in Computer and Communication Engi-neering, Vol. 2, Issue 11, November 2013.

S. Tan, X. Li and Q. Dong, “A Trust Management System for SecuringData Plane of Ad-Hoc Networks”, IEEE Transactions on VehicularTechnology, vol. 65, no. 9, Sep. 2016.

J. Konorski and R. Orlikowski, “A reputation system for MANETs andWSNs using traffic shedding”, Proc. Int. Conf. Applied Sciences inBiomed. and Comm. Technologies, Rome, Italy, Nov. 2010.

D. Johnson, D. Maltz, and J. Broch, DSR: “The Dynamic SourceRouting Protocol for Multi-hop Wireless Ad Hoc Networks”, Boston,MA: Addison-Wesley, 2001.

K. J. Ray Liu and B. Wang, “Repeated games and learning for packet for-warding”, Cognitive Radio Networking and Security A Game-TheoreticView, Cambridge University Press, pp. 270-296, Oct. 2010.

OpenSim.Ltd, https://omnetpp.org/

J. Nagle, “Congestion Control in IP/TCP Internetworks”, Request forComments 896, IETF, January 1984

Downloads

Published

2024-04-19

Issue

Section

Wireless and Mobile Communications