We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Novel MAC layer-based Reputation System for MANETs

by Hannah Monisha J., Rhymend Uthariaraj V.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 8
Year of Publication: 2013
Authors: Hannah Monisha J., Rhymend Uthariaraj V.
10.5120/13880-1772

Hannah Monisha J., Rhymend Uthariaraj V. . A Novel MAC layer-based Reputation System for MANETs. International Journal of Computer Applications. 80, 8 ( October 2013), 13-18. DOI=10.5120/13880-1772

@article{ 10.5120/13880-1772,
author = { Hannah Monisha J., Rhymend Uthariaraj V. },
title = { A Novel MAC layer-based Reputation System for MANETs },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 8 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number8/13880-1772/ },
doi = { 10.5120/13880-1772 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:00.299281+05:30
%A Hannah Monisha J.
%A Rhymend Uthariaraj V.
%T A Novel MAC layer-based Reputation System for MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 8
%P 13-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is a self-organizing system of mobile nodes that can be connected by wireless links on an ad hoc basis. In a MANET, the nodes are free to move randomly, causing the network's topology to change dynamically. Their high mobility and ad hoc nature poses greater security threats. Moreover, because they do not have a centralized controlling entity, it may be advantageous for individual nodes not to cooperate. Misbehavior of nodes can be commonly found in either forwarding or routing. Among these, timing attack at the MAC layer leads to serious consequences such as violation of QoS. Reputation systems can handle such kind of misbehavior that is observable. This paper proposes a MAC Layer based Reputation System for MANETs. It incorporates misbehavior observation, statistical calculation of reputation index, diagnosis and mitigation. The proposed model is implemented with modifications in the MAC component of ns2 and the results are compared with the existing MAC protocol. Result shows that the proposed model enhances the network performance by reducing the number of packet drops by 11% and increasing the throughput in the network by 23%.

References
  1. Rajabhushanam C. and Kathirvel A. , 2011, Survey of Wireless MANET Application in Battlefield Operations, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 1. pp. 50-58
  2. M. Ash and K. Oivind. , 2010 Quality of Service in Mobile Ad Hoc Networks: A Survey, International Journal of Ad Hoc and Ubiquitous Computing, Vol. 6, No. 2, pp. 75-98.
  3. S. Radosavac, J. Baras, and I. Koutsopoulos, 2005, A Framework for MAC Protocol Misbehavior Detection in Wireless Networks, Proc. ACM WiSe.
  4. Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Pavlou, 2008, Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks, Journal of Internet Engineering, Vol. 2, No. 1, pp. 181-192
  5. Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei, 2007, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, Signals and Communication Technology, Springer, Part II, pp. 103-135.
  6. Lolla V. , Law L. K. , Krishnamurthy S. , Ravishankar C and Manjunath, D. , 2006, Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks. , Proceedings of IEEE ICDCS.
  7. Jin-Hee Cho and Ing-Ray Chen. , 2011, A Survey on Trust Management for Mobile Ad Hoc Networks" IEEE Communications Surveys & Tutorials,Vol. 13, No. 4, Fourth Quarter 2011.
  8. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. , 2000, Reputation Systems. , Communications of the ACM, 43(12):4548.
  9. Bucheggar, S. , Boudec, J. Y. , 2000, Performance analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness in Dynamic Ad Hoc NeTworks. In: Proceedings of the 3rd Symposium on Mobile Ad-Hoc Networking and Computing, pp. 226-236.
  10. Michiardi, P. , Molva, R. , 2002, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks", in CMS'02, Communications and Multimedia Security Conference.
  11. Srinivasan, J. Teitelbaum and J. Wu. , 2006, DRBTS: Distributed Reputation based Beacon Trust System. , In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA.
  12. S. Ganeriwal and M. Srivastava. , 2004, Reputation-based framework for high integrity sensor networks. , In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pp. 66-77.
  13. S. Bansal and M. Baker. , 2003, Observation-based Cooperation Enforcement in Ad Hoc Networks. http://arxiv. org/pdf/cs. NI/0307012.
  14. S. Marti, T. J. Giuli, K. Lai, and M. Baker. , 2000, Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking.
  15. IEEE Std 802. 11-2007, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
  16. Hannah Monisha J. and Rhymend Uthariaraj V. , 2012, Diagnosing MAC Misbehavior in Mobile Ad Hoc Networks using Statistical Methods. , International Journal of Computer Science and Network Security (IJCSNS), ISSN: 1738-7906, Vol. 12, No. 5, pp. 1-9.
  17. Szott S. , Natkaniec M and Canonico R. , 2011, Detecting backoff misbehavior in IEEE 802. 11 EDCA. , Wiley European Transactions on Telecommunications, Vol. 22, pp. 31-34.
  18. Serrano, P. , Banchs, A. , Targon, V. , and Kukielka, J. , 2010, Detecting selfish configurations in 802. 11 WLANs, IEEE Communications letters, 14:pp. 142-144.
  19. Vijay K. Rohatgi and A. K. Md. Ehsanes Saleh, 2001, An Introduction to Probability and Statistics, John Wiley & Sons, Inc.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Timing Misbehavior MAC Layer Trust Reputation.