Title
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
Abstract
Due to dynamic network topology, distributed architecture and absence of a centralized authority, Mobile Ad hoc Networks (MANETs) are vulnerable to various attacks from misbehaving nodes. To enhance the security of MANETs, various trust-based schemes have been proposed that augment the traditional cryptography-based security schemes. However, most of these schemes use static and predefined trust thresholds for node misbehavior detection, without taking into consideration the network conditions locally at each node. Using static trust thresholds for misbehavior detection may result in high false positives, low malicious node detection rate, and network partitioning. In this paper, we propose a novel Adaptive Trust Threshold (ATT) strategy that adapts the trust threshold in the routing protocol according to the network conditions such as rate of link changes, node degree and connectivity, and average neighborhood trustworthiness. We identify the topology factors that affect the trust threshold at each node, and leverage them to build a mathematical model for ATT computation. We compare our ATT strategy with one of the most recently proposed trust-based security schemes. Our simulation results indicate that the ATT strategy is robust in terms of convergence to the same trust threshold value computed at all neighbor nodes for malicious nodes and is energy efficient. Moreover, the ATT strategy achieves significant improvements in packet delivery ratio, reduction in false positives, and increase in detection rate as compared to non-ATT schemes (static trust threshold based schemes).
Year
DOI
Venue
2017
https://doi.org/10.1007/s11036-017-0867-0
MONET
Keywords
Field
DocType
MANETs,Threshold computation,Adaptive threshold,Static threshold,Colluding attackers
Mobile ad hoc network,Convergence (routing),Computer science,Cryptography,Efficient energy use,Network packet,Computer network,Routing protocol,Network conditions,Distributed computing,False positive paradox
Journal
Volume
Issue
ISSN
22
3
1383-469X
Citations 
PageRank 
References 
0
0.34
28
Authors
6
Name
Order
Citations
PageRank
Muhammad Saleem Khan184.20
Daniele Midi2799.79
Saif Ur Rehman Malik323219.16
Majid Iqbal Khan49511.44
Nadeem Javaid51043222.46
Elisa Bertino6140252128.50