Reputation based Efficient Isolation of Wormhole Nodes
نویسندگان
چکیده
Mobile Adhoc Network (MANET) is infrastructure less as it does not require any specialized router to do the routing tasks. Instead, each and every node in MANET acts as a router as well to perform the routing tasks with the dependability on a routing protocol. This feature of MANET leads to serious security threats affecting the performance of the network. The attacks may be done at various layers of the network. Thus, security becomes the vital service for the success of MANET. Network Layer protocols extend connectivity from neighboring 1-hop nodes to all other nodes in MANET. A variety of attacks targeting the network layer have been identified. One such critical problem is wormhole attack. This paper proposes a reputation based isolation of wormhole node, which provides a trust computation to the Worm Hole Avoidance protocol (WARP), leaving the normal node without any support for additional hardware .It combines the advantages of WARP and the basic trust model. General Terms Mobile Adhoc Networks (MANET), AODV, Reputation, Trust, Security, Network Layer.
منابع مشابه
GGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
متن کاملSWAT: A Decentralized Self-healing Mechanism for Wormhole Attacks in Wireless Sensor Networks
This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملIsolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-hoc Network
In an ad hoc network, the transmission range of nodes is limited; hence nodes mutually cooperate with its neighbouring nodes in order to extend the overall communication. However, along with the cooperative nodes, there may be some reluctant nodes like selfish nodes and malicious nodes present in the network. Such nodes degrade the performance of the network. This paper, gives a survey of reput...
متن کاملLocation-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks we introduce a location-aware, trust-based protocol that detects and isolates compro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013