Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks

被引:0
|
作者
Sunil Kumar
Kamlesh Dutta
机构
[1] National Institute of Technology,Department of Computer Science and Engineering
来源
关键词
MANETs; AODV; Selfish nodes; Direct trust; Indirect trust; Energy consumption;
D O I
暂无
中图分类号
学科分类号
摘要
The applications and protocols conceived for mobile ad hoc networks rely on the assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All nodes have to spend their precious resources (e.g. battery power, memory, computational power, and network bandwidth) for routing and packet forwarding operations for other nodes, in a cooperative way in the network. However, there are some nodes that may intentionally turn themselves to behave selfishly in order to conserve their valuable resources. The selfish behaviour of such nodes drastically reduces the desired degree of cooperation amongst the mobile nodes. Over the course of time, the non-cooperative activities of, such selfish nodes would paralyze the normal functioning of the whole network. Therefore, these types of nodes should be detected and isolated from the network, as soon as they begin to exhibit their selfish behaviour. In this paper, a dynamic trust based intrusion detection technique is presented to detect and isolate the selfish nodes from the network, where the direct trust degree based on direct communication interactions and indirect (recommended) trust degree based on the neighbours’ recommendations are taking into account to accurately judge the selfishness nature of the nodes. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed intrusion detection technique.
引用
收藏
页码:2029 / 2052
页数:23
相关论文
共 50 条
  • [1] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 2029 - 2052
  • [2] A gradual solution to detect selfish nodes in mobile ad hoc networks
    Djenouri D.
    Badache N.
    [J]. International Journal of Wireless and Mobile Computing, 2010, 4 (04) : 264 - 274
  • [3] Using a cache scheme to detect selfish nodes in mobile ad hoc networks
    Liu, Hongxun
    Delgado-Frias, Jose G.
    Medidi, Sirisha
    [J]. PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 61 - 66
  • [4] New approach for selfish nodes detection in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 288 - 294
  • [5] Random feedbacks for selfish nodes detection in mobile ad hoc networks
    Djenouri, D
    Ouali, N
    Mahmoudi, A
    Badache, N
    [J]. OPERATIONS AND MANAGEMENT IN IP-BASED NETWORKS, PROCEEDINGS, 2005, 3751 : 68 - 75
  • [6] Intrusion detection system for mobile Ad hoc networks based on the behavior of nodes
    [J]. Mamatha, S., 1600, Science and Engineering Research Support Society (07):
  • [7] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
  • [8] An auction based AODV protocol for mobile ad hoc networks with selfish nodes
    Demir, Cenker
    Comaniciu, Cristina
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3351 - 3356
  • [9] Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks
    Gunasekaran, R.
    Uthariaraj, V. Rhymend
    Sudharsan, R.
    Priyadarshini, S. Sujitha
    Yamini, U.
    [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1857 - 1860
  • [10] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260