We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks

by Marianne A. Azer, Noha Gamal El-din Saad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 20
Year of Publication: 2015
Authors: Marianne A. Azer, Noha Gamal El-din Saad
10.5120/21342-4354

Marianne A. Azer, Noha Gamal El-din Saad . Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications. 120, 20 ( June 2015), 12-20. DOI=10.5120/21342-4354

@article{ 10.5120/21342-4354,
author = { Marianne A. Azer, Noha Gamal El-din Saad },
title = { Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 20 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number20/21342-4354/ },
doi = { 10.5120/21342-4354 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:43.075573+05:30
%A Marianne A. Azer
%A Noha Gamal El-din Saad
%T Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 20
%P 12-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Networks (MANETs) consist of self-governed nodes, they have no fixed infrastructure. They are stand alone or connected to the bigger internet as per the different applications. The dynamic nature of MANETs adds many challenges to the network management techniques. Likewise, their special characteristics such as the lack of infrastructure, self-government, mobility, and limited resources makes them vulnerable to a lot of attacks. Reputation systems can help mitigating attacks. Trust management using a reputation mechanism is considered as a vibrant security solution to enable the collaboration of MANETs. In this paper, we propose a Functional REPutation system for Ad hoc Networks, (FREPAN), which aims to improve the MANETS performance and mitigate selfishness and misbehavior attacks' effects. The overall system structure is introduced and its performance is tested under the presence of the jellyfish attacks.

References
  1. H. L. Nguyen,U. T. Nguyen, "Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks," International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006. Patel.
  2. V. H. , Zaveri, M. A. , & Rath, H. K. (2015). Trust Based Routing in Mobile Ad-Hoc Networks. Lecture Notes on Software Engineering, 3(4). ?
  3. Neeli, J. , & Cauvery, N. K. (2015). Comparative Study of Secured Routing Protocols in Wireless Ad hoc Networks: A Survey. ?
  4. Chakrabarti, C. , Banerjee, A. , Chakrabarti, S. , & Chakraborty, A. "A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network". In Computational Advancement in Communication Circuits and Systems (pp. 279-289). Springer India, 2015?. ?
  5. Merro, M. , & Sibilio, E. . "A calculus of trustworthy ad hoc networks". Formal Aspects of Computing, 25(5), 801-832, 2013.
  6. Huang, K. L. , Kanhere, S. S. , & Hu, W. (). "On the need for a reputation system in mobile phone based sensing". Ad Hoc Networks, 12, 130-149, 2014
  7. P. Mirchiardi and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks" In Proceedings of the European Wireless Conference, 2002.
  8. S. Buchegger and J-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks), In Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
  9. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000) 2000.
  10. S. Buchegger and J. -Y. Le Boudec, "The Effect of Rumor Spreading in Reputation Systems in Mobile Ad Hoc Networks", In Proceedings of Wiopt' 03, Sofia- Antipolis, March 2003.
  11. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation System", Communications of the ACM, 43(12): 4548, 2000.
  12. Wang, K. , Wu, M. , & Shen, S. (2008, April). A trust evaluation method for node cooperation in mobile ad hoc networks. In Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on (pp. 1000-1005). IEEE.
  13. Visalakshi, P. , & Kasmir Raja, S. V. (2014). Distributed node level security monitoring system for mobile ad hoc networks. International Journal of Mobile Network Design and Innovation, 5(3), 157-165. ?
  14. Soltanali, S. , Pirahesh, S. , Niksefat, S. , & Sabaei, M. (2007, June). An efficient scheme to motivate cooperation in mobile ad hoc networks. In Networking and Services, 2007. ICNS. Third International Conference on (pp. 98-98). IEEE.
  15. Maamar, M. , Liu, J. , & Liu, W. (2014, May). A new lightweight link quality based reputation model for Space-Air-Ground Integrated Wireless Sensor Network (SAGIWSN). In Electronics, Computer and Applications, 2014 IEEE Workshop on (pp. 230-236). IEEE. ?
  16. Boukerche, A. , & Ren, Y. (2008, October). A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp. 88-95). ACM.
  17. Karlof, C. , & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293-315. ?
  18. Li, J. , Li, R. , & Kato, J. (2008). Future trust management framework for mobile ad hoc networks. Communications Magazine, IEEE, 46(4), 108-114. ?
  19. Liu, Z. , Joy, A. W. , & Thompson, R. A. (2004, May). A dynamic trust model for mobile ad hoc networks. In Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of (pp. 80-85). IEEE. ?
  20. Li, H. , & Singhal, M. (2007). Trust management in distributed systems. Computer, (2), 45-53. ?
  21. Sun, Y. L. , Yu, W. , Han, Z. , & Liu, K. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. Selected Areas in Communications, IEEE Journal on, 24(2), 305-317. ?
  22. Yang, H. , Luo, H. , Ye, F. , Lu, S. , & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11(1), 38-47. ?
  23. Yu, Y. , Peng, Y. , Yu, Y. , & Rao, T. (2014). A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks. Computers & Electrical Engineering.
  24. Li, Z. , & Chigan, C. (2014). On Joint Privacy and Reputation Assurance for Vehicular Ad Hoc Networks. Mobile Computing, IEEE Transactions on, 13(10), 2334-2344. ?
  25. Yu, Y. , Guo, L. , Wang, X. , & Liu, C. (2010). Routing security scheme based on reputation evaluation in hierarchical ad hoc networks. Computer Networks, 54(9), 1460-1469. ?
  26. Ding, Q. , Li, X. , Jiang, M. , & Zhou, X. (2010, October). Reputation-based trust model in vehicular ad hoc networks. In Wireless Communications and Signal Processing (WCSP), 2010 International Conference on (pp. 1-6). IEEE.
  27. Li, J. , Li, R. , & Kato, J. (2008). Future trust management framework for mobile ad hoc networks. Communications Magazine, IEEE, 46(4), 108-114. ?
  28. Ding, Q. , Li, X. , Jiang, M. , & Zhou, X. (2010, October). Reputation-based trust model in vehicular ad hoc networks. In Wireless Communications and Signal Processing (WCSP), 2010 International Conference on (pp. 1-6). IEEE.
  29. Li, J. , Li, R. , & Kato, J. (2008). Future trust management framework for mobile ad hoc networks. Communications Magazine, IEEE, 46(4), 108-114. ?
  30. Ren, Y. , & Boukerche, A. (2008, May). Modeling and managing the trust for wireless and mobile ad hoc networks. In Communications, 2008. ICC'08. IEEE International Conference on (pp. 2129-2133). IEEE. ?
  31. Shen, H. , & Li, Z. (2008, June). Arm: an account-based hierarchical reputation management system for wireless ad hoc networks. In Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on (pp. 370-375).
  32. Kraounakis, S. , Demetropoulos, I. N. , Michalas, A. , Obaidat, M. S. , Sarigiannidis, P. G. , & Louta, M. D. A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems. ?
  33. Li, W. , Joshi, A. , & Finin, T. (2013). Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies. Distributed and Parallel Databases, 31(2), 353-376. ?
  34. Michiardi, P. , & Molva, R. . "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks". In Advanced Communications and Multimedia Security (pp. 107-121). Springer US. , 2002.
  35. Adams, W. J. , Hadjichristofi, G. C. , & Davis IV, N. J. "Calculating a node's reputation in a mobile ad hoc network". In Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International (pp. 303-307). IEEE. , 2005.
  36. Velloso, P. B. , Laufer, R. P. , de O Cunha, D. , Duarte, O. C. M. B. , & Pujolle, G. "Trust management in mobile ad hoc networks using a scalable maturity-based model". Network and Service Management, IEEE Transactions on, 7(3), 172-185, 2010.
  37. Zhang, Y. , & Lazos, L. William Jr. Kozma. "AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks". IEEE transactions on mobile computing, 10, 2009.
  38. Trivedi, A. K. , Kapoor, R. , Arora, R. , Sanyal, S. , & Sanyal, S. "RISM-Reputation Based Intrusion Detection
  39. System for Mobile Ad hoc Networks". arXiv preprint arXiv:1307. 7833, 2013.
  40. Buchegger, S. , & Le Boudec, J. Y. "Performance analysis of the CONFIDANT protocol". In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (pp. 226-236). ACM, 2002.
  41. Buchegger, S. , & Le Boudec, J. Y. (2003). A robust reputation system for mobile ad-hoc.
  42. He, Q. , Wu, D. , & Khosla, P. "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks". In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE (Vol. 2, pp. 825-830). IEEE, 2004.
  43. Dai, W. , Moser, L. E. , Melliar-Smith, P. M. , Lombera, I. M. , & Chuang, Y. T. "The iTrust Local Reputation System for Mobile Ad-Hoc Networks". In Proceedings of the 2013 International Conference on Wireless Networks, 2013.
  44. Marti, S. , Giuli, T. J. , Lai, K. , & Baker, M. "Mitigating routing misbehavior in mobile ad hoc networks". In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265). ACM. , 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc networks Jellyfish MANETs misbehavior reputation selfishness trust.