CFP last date
20 May 2024
Reseach Article

A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks

by T. Sakthivel, S. Vijaybhanu, Rm.chandrasekaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 14
Year of Publication: 2012
Authors: T. Sakthivel, S. Vijaybhanu, Rm.chandrasekaran
10.5120/7258-0297

T. Sakthivel, S. Vijaybhanu, Rm.chandrasekaran . A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks. International Journal of Computer Applications. 47, 14 ( June 2012), 30-38. DOI=10.5120/7258-0297

@article{ 10.5120/7258-0297,
author = { T. Sakthivel, S. Vijaybhanu, Rm.chandrasekaran },
title = { A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 14 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 30-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number14/7258-0297/ },
doi = { 10.5120/7258-0297 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:41:52.491024+05:30
%A T. Sakthivel
%A S. Vijaybhanu
%A Rm.chandrasekaran
%T A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 14
%P 30-38
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks perform well only when nodes in the network cooperate in routing and packet forwarding. As these networks are lack of security aspects, selfish and malicious nodes become a part of that network resulting in performance degradation. This paper suggests a leader based reputation system for identifying routing misbehavior. The reputation system is constructed using trust value and decision made in routing that are based on past experience, observations and/ or informed behavior of other nodes. Trust value is evaluated using trust resilient algorithm and it is based on two important parameters namely, efficacy factor and feedback reliability. A node with high battery life and high trust value is elected as a leader. The member nodes report the reputation value and feedback to the leader. The leader node maintains a reputation and feedback records of all its member nodes. The reputation value is an integer value and feedback is just a phrase conveying the satisfaction level of performance of a node. A node with continuous negative feedback is treated as a malicious node and isolated from the network. Feedback is aggregated using modified periodic per hop adaptive aggregation techniques. This proposal detects a malicious node effectively and avoids false reporting as it considers only feedback from the highly reputed node. We perform an overall analysis of our paper by simulation using the network simulator (NS- 2). The experimental results clearly indicate the effectiveness and advantages of our proposed system in eliminating misbehaving nodes.

References
  1. Imrich Chlamtac, Marco Conti, and Jennifer J. N. Liu "Mobile ad hoc networking: imperatives and challenges" Elsevier transactions on ad hoc networks, volume 1, pp. 13- 64, 2003
  2. David B. Johnson and David A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", in Mobile Computing, pp. 153-181, Kluwer Academic Publishers, 1996.
  3. Matthias Hollick, Jens Schmitt, Christian Seipl, and Ralf Steinmetz "On the Effect of Node Misbehavior in Ad Hoc Networks" IEEE international conference on communications, volume 6, pp. 3759- 3763, 2004
  4. Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara "Reputation Systems: Facilitating Trust in Internet Interactions" communications of ACM, volume 43, issue 12, 2000.
  5. Kun Zeng, Przemys?aw Pawelczak, and Danijela Cabric "Reputation-Based Cooperative Spectrum Sensing with Trusted Nodes Assistance" IEEE communications letters, volume 14, issue 3, 2010
  6. Po-Wah Yau and Chris J. Mitchell "Reputation Methods for Routing Security for Mobile Ad Hoc Networks" IEEE transaction on mobile future and symposium on trends in communications, pp. 130- 137, 2003
  7. Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks" ACM proceedings of the 6th annual international conference on mobile computing and networking, pp. 255- 265, 2000.
  8. Sonja Buchegger and Jean Yves Le Boudec "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Adhoc NeTworks)" proceedings of 3rd ACM international symposium on mobile Adhoc networking and computing, pp. 226- 236, 2002
  9. Pietro Michiardi and Refik Molva "CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks" Springer transaction on advanced communication and multimedia security, pp. 107- 121, 2002
  10. Sonja Buchegger and Jean-Yves Le Boudec "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks" WiOpt'03 proceedings on modeling and optimization in mobile, ad hoc and wireless networks, volume 1, 2003
  11. Orhan Dagdeviren and Kayhan Erciyes "A Hierarchical Leader Election Protocol for Mobile Ad hoc Networks" LNCS, volume- 5101, pp. 509- 518, Springer, 2008
  12. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattachary "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET" IEEE transaction on dependable and secure computing, volume 8, issue 1, pp. 89- 103, 2011
  13. Yacine Rebahi, Vicente . E Mujica V, and Dorgham Sisalem "A Reputation-Based Trust Mechanism for Ad hoc Networks" proceedings of IEEE symposium on computers and communications, pp. 37- 42, 2005
  14. Lidong Zhou and Zygmunt J. Haas "Securing Ad Hoc Networks" IEEE transaction on network, volume 13, issue 6, pp. 24- 30, 1999
  15. Sudarshan Vasudevan, Brian DeCleene, Jim Kurose, and Don Towsley "Secure Leader Election in Wireless Ad Hoc Networks" IEEE proceedings of DARPA information survivability conference and exposition, volume 1, pp. 261- 272, 2003
  16. Jochen Mundinger and Jean-Yves Le Boudec "Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars" Elsevier transaction on performance evaluation, volume 65, issue 3- 4, pp. 212- 226, 2008
  17. Sonja Buchegger and Jean-Yves Le Boudec "A Robust Reputation System for Mobile Ad-hoc Networks" EPFL IC Technical report IC/ 2003/ 50, 2003
  18. Mohamed Tamer Refaei, Luiz A. DaSilva, Mohamed Eltoweissy, and Tamer Nadeem "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks" IEEE Transactions on computers, volume 59, issue 5, 2010
  19. Elena Fasolo, Michele Rossi, Jorg Widmer and Michele Zorzi "In-network Aggregation Techniques for Wireless Sensor Networks: A Survey" IEEE transactions on wireless communications, volume 14, issue 2, pp. 70- 87, 2007
  20. "The Network Simulator (ns-2)," http://www. isi. edu/nsnam/ns/, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Dsr Manets Node Cooperation Node Reputation Trust Evaluation Leader Election Node Misbehavior