Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Ji Guo This email address is being protected from spambots. You need JavaScript enabled to view it.1,2, Alan Marshall3 and Bosheng Zhou1

1Institute of Electronics, Communications and Information Technology, Queens University Belfast, UK
2National University of Defense Technology, P.R. China
3Department of Electrical Engineering & Electronics, University of Liverpool, UK


 

Received: March 6, 2013
Accepted: October 14, 2013
Publication Date: March 1, 2014

Download Citation: ||https://doi.org/10.6180/jase.2014.17.1.07  


ABSTRACT


A new prediction model for mobile ad hoc networks (MANETs) is presented that applies multiple types of parameters to achieve much higher accuracy in detecting misbehaviour in MANETs than has previously been possible using current frameworks that rely exclusively on a single type of parameter to obtain their trust values. The prediction model applies a multi-parameter trust framework for MANETs (MTFM), based on Grey theory with Exponentially Weighted Moving-Averaging, to forecast a node’s normal trust value based on previous observations. A key feature of this model is its ability to calculate the possible range of normal trust values for the judgment of one node’s trust values. Simulations conducted in an 802.11 based MANET are presented, and the results obtained from the new prediction model are compared with those of existing trust models. These show that the new prediction model offers much better performance in detecting mobile nodes exhibiting misbehaviours.


Keywords: Trust Framework, Prediction Model, Misbehaviour Detection, MANET, Wireless Network Security


REFERENCES


  1. [1] Hu, Y. and Perrig, A., “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, Vol. 11, Issue 12, pp. 2138 (2005). doi: 10.1007/s11276-004-4744-y
  2. [2] Li, J., Li, R. and Kato, J., “Future Trust Management Framework for Mobile Ad Hoc Networks,” IEEE Communications Magazine, Vol. 46, No. 2, pp. 108 114 (2008). doi: 10.1109/MCOM.2008.4481349
  3. [3] Sun, Y. L., Han, Z. and Liu, K. J. R., “Defense of Trust Management Vulnerabilities in Distributed Networks,” IEEE Communications Magazine, Vol. 46, No. 2, pp. 112119 (2008). doi: 10.1109/MCOM.2008.4473092
  4. [4] Blaze, M., Feigenbaum, J. and Keromytis, A. D., “KeyNote: Trust Management for Public-Key Infrastructures,” in Security Protocols: 6th International Workshop Cambridge, UK, April 15-17, 1998: Proceedings. B. Christianson, B. Crispo, W. S. Harbison and M. Roe, Ed. London; Springer Berlin/Heidelberg, pp. 5963 (1998). doi: 10.1007/3-540-49135-X_9
  5. [5] Stajano, F. and Anderson, R. J., “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” in Proceedings of the 7th International Workshop on Security Protocols, pp. 172194 (2000). doi: 10.1007/10720107_24
  6. [6] Sun, Y. L., Yu, W., Han, Z. and Liu, K. J. R., “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE Journal of Selected Areas in Communications (J-SAC), Vol. 24, No. 2, pp. 305317 (2006). doi: 10.1109/JSAC. 2005.861389
  7. [7] Li, H. and Singhal, M., “Trust Management in Distributed Systems,” IEEE Computer Society, Vol. 40, pp. 4553 (2007). doi: 10.1109/MC.2007.76
  8. [8] Tuan, T. A., “A Game-Theoretic Analysis of Trust Management in P2P Systems,” in Proceedings of the First International Conference on Communications and Electronics (ICCE), pp. 130134 (2006). doi: 10.1109/CCE.2006.350832
  9. [9] Dai, H., Jia, Z. and Qin, Z., “Trust Evaluation and Dymanic Routing Decision Based on Fuzzy Theory for MANETs,” Journal of Software, Vol. 4, No. 10, pp. 10911101 (2009). doi: 10.4304/jsw.4.10.1091-1101
  10. [10] Guo, J., Marshall, A. and Zhou, B., “A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad Hoc Wireless Networks Using Fuzzy Sets and Grey Theory,” in Proceedings of IFIPTM 2011, IFIP ACIT 358, pp. 277289 (2011). doi: 10.1007/978-3-642-22200-9_22
  11. [11] Guo, J., Marshall, A. and Zhou, B., “A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks,” in Proceedings of IEEE TustCom-11, pp. 142149 (2011). doi: 10.1007/978-3-642-22200-9_22
  12. [12] Zapata, M. G. and Asokan, N., “Securing Ad Hoc Routing Protocols,” in Proceedings of ACM Workshop on Wireless Security WiSe ’02, pp. 110 (2002). doi: 10.1145/570681.570682
  13. [13] Hu, Y., Perrig, A. and Johnson, D. B., Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Journal of Wireless Networks, Vol. 11, No. 12, pp. 2138 (2005). doi: 10.1007/s11276-004- 4744-y
  14. [14] Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C. and Belding-Royer, E. M., “A Secure Routing Protocol for Ad Hoc Networks,” in Proceedings of 10th IEEE International Conference on Network Protocols 2002, pp. 7887 (2002). doi: 10.1109/ICNP.2002.1181388
  15. [15] Yang, H., Meng, X. and Lu, S., “Self-Organized Network-Layer Security in Mobile Ad Hoc Networks,” in Proceedings of the ACM Workshop on Wireless Security, WiSE ‘02, pp. 1120 (2002). doi: 10.1145/ 570681.570683
  16. [16] Hubaux, J., Buttyan, L. and Capkun, S., “The Quest for Security in Mobile Ad Hoc Networks,” in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc ‘01, pp. 146155 (2001). doi: 10.1145/501416.501437
  17. [17] Capkun, S., Buttyan, L. and Hubaux, J., “Self-Organized Public-Key Management for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 5264 (2003). doi: 10.1109/TMC. 2003.1195151
  18. [18] Agah, A., Das, S. K. and Basu, K., “A Non-Cooperative Game Approach for Intrusion Detection in Sensor Networks,” in Proceedings of IEEE 60th Vehicular Technology Conference 2004, VTC2004-Fall, pp. 2902 2906 (2004). doi: 10.1109/VETECF.2004.1400591
  19. [19] Li, H. and Singhal, M., “Trust Management in Distributed Systems,” Computer, Vol. 40, No. 2, pp. 45 53 (2007). doi: 10.1109/MC.2007.76
  20. [20] Eschenauer, L., Gligor, V. D. and Baras, J., “On Trust Establishment in Mobile Ad-Hoc Networks,” in Proceedings of the Security Protocols Workshop 2002, pp. 4766 (2002). doi: 10.1007/978-3-540-39871-4_6
  21. [21] Teng, Y., Phoha, V. V. and Choi, B., Design of Trust Metrics Based on Dempster Shafer Theory. URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi= 10.1.1.21.8090 (2008).
  22. [22] Gray, E., Seigneur, J., Chen, Y. and Jensen, C., “Trust Propagation in Small Worlds,” in Proceedings of the 1st International Conference on Trust Management, iTrust’03, pp. 239254 (2003). doi: 10.1007/3-540- 44875-6_17
  23. [23] Jøsang, A., Artificial Reasoning with Subjective Logic (1997).
  24. [24] Jøsang, A., “A Logic for Uncertain Probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, No. 2, pp. 279311 (2001). doi: 10.1142/S0218488501000831
  25. [25] Buchegger, S. and Boudec, J., “Performance Analysis of the Confidant Protocol: Cooperation of Nodes - Fairness in Dynamic Ad-Hoc Networks,” in Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC ‘02 (2002). doi: 10.1145/513800.513828
  26. [26] Perkins, C. E. and Royer, E. M., “Ad-Hoc On-Demand Distance Vector Routing,” in Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA ‘99, pp. 90100 (1999). doi: 10.1109/MCSA.1999.749281
  27. [27] Johnson, D. B. and Maltz, D. A., “Dynamic Source Routing in Ad Hoc Wireless Networks,” in T. Imielinski and H. Korth, eds., Mobile Computing. Kluwer Academic Publishers, pp. 153181 (1996). doi: 10.1007/ 978-0-585-29603-6_5
  28. [28] Perkins, C. E. and Bhagwat, P., “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” in Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM ‘94, pp. 234244 (1994).doi: 10.1145/190314.190336
  29. [29] Li, X., Lyu, M. R. and Liu, J., “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks,” in Proceedings of 2004 IEEE Aerospace Conference, pp. 12861295 (2004). doi: 10.1109/AERO.2004.1367726
  30. [30] Deng, J., Introduction to Grey Theory, Wuhan: Huazhong University of Science & Technology Press (2002).
  31. [31] Deng, J., A Course in Grey Systems, Wuhan: Huazhong University of Science and Technology Press (1990).
  32. [32] Song, Q. and Jamalipour, A., “Network Selection in an Integrated Wireless LAN and UMTS Environment Using Mathematical Modeling and Computing Techniques,” IEEE Wireless Communication, pp. 4248 (2005). doi: 10.1109/MWC.2005.1452853
  33. [33] Fu, C., Tang, F., Cui, Y., Liu, M. and Peng, B., “Grey Theory Based Nodes Risk Assessment in P2P Networks,” in Proceedings of 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 479483 (2009). doi: 10.1109/ ISPA.2009.45
  34. [34] Whittle, P., “On Principal Components and Least Square Methods of Factor Analysis,” Scandinavian Actuarial Journal, Vol. 1952, No. 34, pp. 223239 (1952).
  35. [35] Gerharz, M. and de Waal, C., “BonnMotion, a Mobility Scenario Generation and Analysis Tool,” Internet: https://net.cs.uni-bonn.de/fileadmin/ag/martini/ projekte/BonnMotion/src/BonnMotion_Docu.pdf (2012).
  36. [36] Saaty, T. L., “Decision Making with the Analytic Hierarchy Process,” International Journal of Services Sciences, Vol. 1, No. 1, pp. 8398 (2008). doi: 10. 1504/IJSSCI.2008.017590
  37. [37] Alonso, J. A. and Lamata, M. T., “Consistency in the Analytic Hierarchy Process: A New Approach,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 14, No. 4, pp. 445 459 (2006). doi: 10.1142/S0218488506004114
  38. [38] Liu, S. and Lin, Y., Grey Information: Theory and Practical Applications, London: Springer-Verlag (2006).

 


    



 

1.6
2022CiteScore
 
 
60th percentile
Powered by  Scopus

SCImago Journal & Country Rank

Enter your name and email below to receive latest published articles in Journal of Applied Science and Engineering.