Mobility and Reputation consideration in Manets

نویسنده

  • S. Venkateswarlu
چکیده

Mobility is main problem in manets. Node movement increases the chance for potential contactors to gather more trust information and evidence, thus enlarging the scope of reputation qualified candidate nodes popularly. Micro Mobility and macro mobility are two movements we have to consider. So checking mobility is main important. Existing system uncertainty deeply impacts a node’s anticipation of others’ behavior and decisions during interaction, After defining a way to reveal and compute the uncertainty in trust opinions we consider mobility, one of the important characteristics of MANETs, to efficiently reduce uncertainty and to speed up trust convergence. In existing System, Two different categories of mobilityassisted uncertainty reduction schemes are provided: the proactive schemes exploit mobile nodes to collect and broadcast trust information to achieve trust convergence; the reactive schemes provide the mobile nodes methods to get authenticated and bring their reputation in the original region to the destination region. In this paper, we consider mobility to support our reputation system. Two types of mobility are included based on distance. Keyterms: mobility, trust information, manets Introduction: Mobility is main feature in Manets. In Manets node to node connectivity is checked. If mobiles are moving then handover increases based on distance. MOBILE ad hoc networks (MANETs) aim to provide wireless network services without relying on any infrastructure. The main challenge in MANETs comes from their self-organized and distributed nature. There is an inherent reliance on collaboration between the participants of a MANET in order to achieve the aimed functionalities. Collaboration is productive only if all participants operate in an honest manner. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for securing MANETs. Trust can be defined as the firm belief in the competence of an entity to act dependably, securely, and reliably within specified context. It represents a MANET participant’s anticipation of other nodes’ behavior when assessing the risk involved in future interactions. Here, the participant is usually called the trustor, and other nodes are called the trustee. The trust relationship usually builds on the basis of the trustor’s past direct interaction experiences and others’ recommendations related to the trustee. The abstracted value from past experiences and recommendations is defined as the trustee’s reputation. Many reputation systems have been proposed in literature. Most of them sharply divide the recorded behavioral information into right or wrong. For example, in the EigenTrust model [1], behavioral information is obtained by counting the number of “satisfactory” and “unsatisfactory” \interactions, and the difference between these two values is stored as reputation. Besides lacking a precise semantic, this information has abstracted away any notion of time. In EigenTrust, value 0 may represent both “no past interaction” and “many unsatisfactory past interactions.” Consequently, one cannot verify exact properties of past behavior based on this information alone. Two types of mobility schemes are to be considered. One is micro mobility which stands for minimum distance. Another stands for macro mobility which is long distance. Previous Works: In existing System, a one-dimensional representation of belief, disbelief, and uncertainty is extended from the subjective logic [2]. Each node keeps a belief and disbelief value toward other nodes as a prediction of their future behavior. As these two values are only predictions, uncertainty always exists. We use a triplet to represent a node’s opinion (b,d, u ) b,d,u are designate belief, disbelief, and uncertainty, respectively. Our approach: When the requirement is a short convergence time to quickly start a trust-based application, or a controllable cost, the above two mobility models will offer extreme options. However, these two methods are not flexible enough and we lack a way to find a trade-off between convergence time and cost to satisfy different application objectives. Here, we present a two-level controlled mobility model, which is called hierarchical scheme. In hierarchical scheme, we divide the whole network into several regions, allowing each region to contain a specified number of grids, and choose mobility models for interand intraregion movement. Hierarchical scheme combines the advantages of the above two models and offers more options for MANET implementation. Various kinds of clustering mechanisms have been proposed in the MANETs [8], [9]. After using one of the existing clustering mechanisms, this hierarchical scheme can be applied on top of the clusters. Mobility and Reputation consideration in Manets International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.3, May-June 2012 pp-1339-1340 ISSN: 2249-6645 www.ijmer.com 1340 | Page Algorithm 1. VoteForMove 1: while t=mthreshold 5:Get opnion(node,Supervisor) 4: end while 5: Compute(b; d; u) for each node; 6: if the largest b in all the opinions satisfy b >= Bmin then 7: Vote the node with the largest b; 8: Wait (elected moving node) 9: else 10: Continue(); 11: end if; In this algorithm, movement is calculated based on distance. If m is within threshold then it is called micro mobility. Micro mobility doesn’t require confirmation from supervisor. Because movement is within distance. But Macro mobility requires confirmation from nearest supervisor. This supervisor acts as Foreign agent from one place to another place. All nodes will store mobile behavior but supervisor will store particular opinion only. Algorithm 2. Vote Gathering 1:Counter++; 2: if counter>=threshold then Start move(); Broadcast(); 4: end if; This algorithm shows counter increment. If counter meets threshold then node broadcasts information to all nodes including supervisor. And it starts moving.The moving nodes repeat the local contact process after they arrive in the capital. The pause time period in the capital allows them to build trust between each other and the local nodes of the capital. One node, which is commonly trusted by all moving nodes, will be elected to be the keeper of that region through a process similar to Algorithms 1 and 2. The keeper selects several nodes it trusts as supervisors, which will travel between regions to collect information and feed it back to the keeper. Conclusion: We study the impact of nodes’ behavior inconsistency on our reputation system. Our approach finds well in all types of mobility schemes like micro and macro mobility. This approach well says about moving mobility. Uncertainty is one important metric in MANETs. Certaintyoriented reputation systems can achieve good detection rates while keeping the false positive rate at a low level. With proactive or reactive schemes, we can efficiently disseminate trust and reduce uncertainty by exploiting nodes’ movement. All the schemes illustrate the uncertainty reduction effect with the assistance of mobility. Different mobility schemes provide different tradeoffs between delay, cost, and uncertainty. The controlled mobility-based schemes appear to offer better performance in terms of uncertainty reduction. References: [1] P. Michiardi, R. Molva. Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference, 2002. [2] S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM, 2000. [3] The Terminodes Project. www.terminodes.org. [4] L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J-P. Hubaux, and J-Y. Le Boudec. Selforganization in mobile ad hoc networks: The approach of Terminodes. IEEE Communications Magazine, June 2001. [5] L. Buttyan and J-P. Hubaux. Enforcing service availability in mobile ad hoc networks. In proceedings of MobiHOC, 2000. [6] J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli. Toward self-organized mobile ad hoc networks: The Terminodes Project. IEEE Communications Magazine, January 2001. [7] L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in selforganized ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology -Lausanne, 2001. [8] L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24--30, November/December 1999. [9] G. Zacharia. Collaborative Reputation Mechanisms for online communities. Master's thesis, MIT, September 1999. [10] D. Zhou and J. Wu, “Survivable Multi-Level Ad-Hoc Group Operations,” Proc. Int’l Workshop Mobile and Wireless Networks, 2003. [11] J. Yu and P. Chong, “A Survey of Clustering Schemes for Mobile Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 7, no. 1, pp. 32-48, 2005.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme

Mobile ad hoc networks (MANETs) are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption...

متن کامل

A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks

In a multi-hop mobile ad hoc network (MANET), mobile nodes cooperate to form a network without using any infrastructure such as access points or base stations. The mobility of the nodes and the fundamentally limited capacity of the wireless medium, together with wireless transmission effects such as attenuation, multi-path propagation, and interference combine to create significant challenges f...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

The Modified Routing Protocol for Defending against Attacks in MANET

Mobile Ad Hoc Networks are the set of mobile hosts operating without the aid of the established infrastructure of centralized administration. Due to lack of infrastructure, the network can be easily affected by several attacks. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is t...

متن کامل

Comparative Study of Fuzzy Logic Mobility Based FLM- AODV Routing Protocol and AODV in MANETs

In mobile ad hoc wireless networks (MANETs), traditional protocol like AODV performs well for low mobility of nodes but not for high node mobility. So, it becomes important to consider mobility factor during the path selection procedure of routing protocol. Here, a fuzzy logic mobility based protocol (FLMAODV) that considers the mobility factor is proposed. Due to the consideration of mobility ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012