Skip to main content
Erschienen in: Neural Computing and Applications 9/2018

06.09.2016 | Original Article

Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks

verfasst von: Abdulaziz S. Almazyad

Erschienen in: Neural Computing and Applications | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing mobile ad hoc networks (MANET) has been the interest of researchers recently because of its use in important security sectors such as police, rescue teams, and the military. One method to ensure a secure ad hoc network is to identify malicious nodes (hostile) from good nodes by their reputation based on the past experience of packet delivery. In this paper, we explore by applying reputation in various ways the effect to the throughput of a MANET ad hoc network. We simulate four different scenarios where the node reputation is evaluated to choose the most reliable route and eliminate the effect of malicious nodes performing gray-hole attack. One of the applied scenarios is a hybrid method where a sender node takes in consideration the reputation of all the nodes forming a route to choose the most reliable route. We find that by applying the hybrid method the performance of the network is the best and data packets are more likely to be delivered successfully to the intended destination in a very hostile environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Deshmukh A (2015) Identifying misbehaving nodes in wireless sensor networks. Int J Eng Trends Technol 24(6):292–296CrossRef Deshmukh A (2015) Identifying misbehaving nodes in wireless sensor networks. Int J Eng Trends Technol 24(6):292–296CrossRef
2.
Zurück zum Zitat Almazyad A, Seddiq Y, Alotaibi A, Al-Nasheri A, BenSaleh M, Obeid A, Qasim S (2014) A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 14(2):3557–3577 Almazyad A, Seddiq Y, Alotaibi A, Al-Nasheri A, BenSaleh M, Obeid A, Qasim S (2014) A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 14(2):3557–3577
3.
Zurück zum Zitat Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688 Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688
4.
Zurück zum Zitat Alkalbani A, Tap A, Mantoro T (2014) Evaluated reputation-based trust for WSN security. J Theor Appl Inf Technol 70(3):434–442 Alkalbani A, Tap A, Mantoro T (2014) Evaluated reputation-based trust for WSN security. J Theor Appl Inf Technol 70(3):434–442
11.
Zurück zum Zitat Srinivasan A, Teitelbaum J, Wu J (2006) Distributed reputation-based beacon trust system. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing Srinivasan A, Teitelbaum J, Wu J (2006) Distributed reputation-based beacon trust system. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing
14.
Zurück zum Zitat Dewan P, Dagupta P (2003) Trusting routers and relays in ad hoc networks. In: First international workshop on wireless security and privacy (WiSr 2003) in conjunction with IEEE 2003 international conference on parallel processing workshops (ICPP), Arizona State University. http://citeseer.ist.psu.edu/668343.html Dewan P, Dagupta P (2003) Trusting routers and relays in ad hoc networks. In: First international workshop on wireless security and privacy (WiSr 2003) in conjunction with IEEE 2003 international conference on parallel processing workshops (ICPP), Arizona State University. http://​citeseer.​ist.​psu.​edu/​668343.​html
Metadaten
Titel
Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks
verfasst von
Abdulaziz S. Almazyad
Publikationsdatum
06.09.2016
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 9/2018
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-016-2555-6

Weitere Artikel der Ausgabe 9/2018

Neural Computing and Applications 9/2018 Zur Ausgabe

Premium Partner