Skip to main content
Top

2018 | OriginalPaper | Chapter

Hybrid Acknowledgment Punishment Scheme Based on Dempster-Shafer Theory for MANET

Authors : Mahdi Bounouni, Louiza Bouallouche-Medjkoune

Published in: Computational Intelligence and Its Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we cope with malicious nodes dropping packets to disrupt the well-functioning of mobiles ad hoc networks tasks. We propose a new hybrid acknowledgment punishment scheme based on Dempster Shafer theory, called HAPS. The proposed scheme incorporates three interactive modules. The monitor module monitors the behaviour of one-hop nodes in the data forwarding process. The reputation module assesses the direct and the indirect reputation of nodes using Dempster Shafer theory, which is a mathematical method, that can aggregate multiple recommendations shared by independent sources, while some of these recommendations might be unreliable. Since recommendations exchange between nodes consumes resources, a novel recommendation algorithm has been incorporated to deal with false dissemination attack and to minimize the recommendation traffic. The exclusion module punishes nodes regarded as malicious. The simulation results show that HAPS improves the throughput and reduces the malicious dropping ratio in comparison to existing acknowledgment scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Peng, S.C., Wang, G.J., Hu, Z.W., Chen, J.P.: Survivability modeling and analysis on 3D mobile ad-hoc networks. J. Cent. South Univ. Technol. 18(4), 1144–1152 (2011)CrossRef Peng, S.C., Wang, G.J., Hu, Z.W., Chen, J.P.: Survivability modeling and analysis on 3D mobile ad-hoc networks. J. Cent. South Univ. Technol. 18(4), 1144–1152 (2011)CrossRef
2.
go back to reference Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000) Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
3.
go back to reference Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2003)CrossRef Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2003)CrossRef
4.
go back to reference Zong, C., Yang, S.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), pp. 1987–1997 (2003) Zong, C., Yang, S.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), pp. 1987–1997 (2003)
5.
go back to reference Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012 (2003) Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/​0307012 (2003)
6.
go back to reference Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. J. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)CrossRef Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. J. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)CrossRef
7.
go back to reference Mahmoud, M.E., Shen, X.: FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. J. IEEE Trans. Mob. Comput. 11(5), 753–766 (2012)CrossRef Mahmoud, M.E., Shen, X.: FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. J. IEEE Trans. Mob. Comput. 11(5), 753–766 (2012)CrossRef
8.
go back to reference Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 226–236 (2002) Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 226–236 (2002)
9.
10.
go back to reference He, Q., Wu, D., Khosla, P.: SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Wireless Communications and Networking Conference (WCNC), pp. 825–830 (2004) He, Q., Wu, D., Khosla, P.: SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Wireless Communications and Networking Conference (WCNC), pp. 825–830 (2004)
11.
go back to reference Yau, P.W., Mitchell, C.J.: Reputation methods for routing security for mobile ad hoc networks. In: Proceedings of the Mobile Future and Symposium on Trends in Communications, pp. 130–137 (2003) Yau, P.W., Mitchell, C.J.: Reputation methods for routing security for mobile ad hoc networks. In: Proceedings of the Mobile Future and Symposium on Trends in Communications, pp. 130–137 (2003)
12.
go back to reference Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking, pp. 2137–2142 (2005) Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking, pp. 2137–2142 (2005)
13.
go back to reference Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Industr. Electron. 60(3), 1089–1098 (2013)CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Industr. Electron. 60(3), 1089–1098 (2013)CrossRef
14.
go back to reference Shafer, G.A.: Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH Shafer, G.A.: Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH
16.
go back to reference Chen, T.M., Venkataramanan, V.: Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput. 9(6), 35–41 (2005)CrossRef Chen, T.M., Venkataramanan, V.: Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput. 9(6), 35–41 (2005)CrossRef
18.
go back to reference Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)CrossRef Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)CrossRef
19.
go back to reference Sheltami, T., Al-Roubaiey, A., Shakshuki, E., Mahmoud, A.: Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Syst. 15(5), 273–282 (2009)CrossRef Sheltami, T., Al-Roubaiey, A., Shakshuki, E., Mahmoud, A.: Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Syst. 15(5), 273–282 (2009)CrossRef
20.
go back to reference Sun, H.M., Chen, C.H., Ku, Y.F.: A novel acknowledgment-based approach against collude attacks in MANET. Expert Syst. Appl. 39(9), 7968–7975 (2012)CrossRef Sun, H.M., Chen, C.H., Ku, Y.F.: A novel acknowledgment-based approach against collude attacks in MANET. Expert Syst. Appl. 39(9), 7968–7975 (2012)CrossRef
21.
go back to reference Djahel, S., NaïtAbdesselam, F., Zhang, Z., Khokhar, A.: Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Netw. 1(3), 245–258 (2008)CrossRef Djahel, S., NaïtAbdesselam, F., Zhang, Z., Khokhar, A.: Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Netw. 1(3), 245–258 (2008)CrossRef
22.
go back to reference Campos, F., Cavalcante, S.: An extended approach for Dempster-Shafer theory. In: Information Reuse and Integration, pp. 338–344 (2003) Campos, F., Cavalcante, S.: An extended approach for Dempster-Shafer theory. In: Information Reuse and Integration, pp. 338–344 (2003)
23.
go back to reference Bloch, I.: Some aspects of Dempster-Shafer evidence theory for classification of multi-modality medical images considering partial volume effect. Pattern Recogn. Lett. 17(8), 905–919 (1996)CrossRef Bloch, I.: Some aspects of Dempster-Shafer evidence theory for classification of multi-modality medical images considering partial volume effect. Pattern Recogn. Lett. 17(8), 905–919 (1996)CrossRef
24.
go back to reference Bounouni, M., Bouallouche-Medjkoune, L.: A hybrid stimulation approach for coping against the malevolence and selfishness in mobile ad hoc network. Wirel. Pers. Commun. 88(2), 255–281 (2016)CrossRef Bounouni, M., Bouallouche-Medjkoune, L.: A hybrid stimulation approach for coping against the malevolence and selfishness in mobile ad hoc network. Wirel. Pers. Commun. 88(2), 255–281 (2016)CrossRef
Metadata
Title
Hybrid Acknowledgment Punishment Scheme Based on Dempster-Shafer Theory for MANET
Authors
Mahdi Bounouni
Louiza Bouallouche-Medjkoune
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-89743-1_38

Premium Partner