Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

被引:2
|
作者
Abbas, Sohail [1 ]
Merabti, Madjid [1 ]
Kifayat, Kashif [2 ]
Baker, Thar [3 ]
机构
[1] Univ Sharjah, Coll Sci, Dept Comp Sci, Sharjah, U Arab Emirates
[2] Air Univ, Dept Comp Sci & Engn, Islamabad, Pakistan
[3] Liverpool John Moores Univ, Dept Comp Sci, Liverpool, Merseyside, England
关键词
selfish node; reputation and trust systems; Sybil attacks; whitewashing; game theory; STRATEGIES;
D O I
10.3837/tiis.2019.12.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.
引用
收藏
页码:6214 / 6242
页数:29
相关论文
共 50 条
  • [1] A reputation-based service differentiation scheme for mobile ad hoc networks
    Denko, MK
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 197 - 204
  • [2] A Reputation-based Scheme against Malicious Packet Dropping for Mobile Ad Hoc Networks
    Song JianHua
    Ma ChuanXiang
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 113 - 117
  • [3] A reputation-based secure scheme in vehicular ad hoc networks
    Li, Xiaoqing
    Liu, Jicheng
    Li, Xuejun
    Li, Hui
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 83 - 90
  • [4] Reputation-Based Mechanism to Mitigate Misbehavior in Mobile Ad Hoc Networks
    Mani, P.
    Kamalakkannan, P.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [5] Secure opinion sharing for reputation-based systems in mobile ad hoc networks
    Sangi, Abdur Rashid
    Liu, Jianwei
    Alkatheiri, Mohammed S.
    Anamalamudi, Satish
    [J]. MEASUREMENT & CONTROL, 2020, 53 (3-4): : 748 - 756
  • [6] Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks
    Anantvalee, Tiranuch
    Wu, Jie
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3383 - 3388
  • [7] Reputation-based routing in hybrid ad hoc networks
    Tourolle, Benjamin
    Laniepce, Sylvie
    Achemlal, Mohammed
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 101 - +
  • [8] A reputation-based trust mechanism for ad hoc networks
    Rebahi, Y
    Mujica-V, VE
    Sisalem, D
    [J]. 10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 37 - 42
  • [9] SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    He, Q
    Wu, DP
    Khosla, P
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 825 - 830
  • [10] A novel dynamic reputation-based source routing protocol for mobile ad hoc networks
    Lenin Guaya-Delgado
    Esteve Pallarès-Segarra
    Ahmad Mohamad Mezher
    Jordi Forné
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019