Open Access   Article Go Back

Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications

K. A. Adoni1 , A. S. Tavildar2 , K.K. Warhade3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 228-238, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.228238

Online published on Jul 31, 2018

Copyright © K. A. Adoni, A. S. Tavildar, K.K. Warhade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. A. Adoni, A. S. Tavildar, K.K. Warhade, “Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.228-238, 2018.

MLA Style Citation: K. A. Adoni, A. S. Tavildar, K.K. Warhade "Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications." International Journal of Computer Sciences and Engineering 6.7 (2018): 228-238.

APA Style Citation: K. A. Adoni, A. S. Tavildar, K.K. Warhade, (2018). Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications. International Journal of Computer Sciences and Engineering, 6(7), 228-238.

BibTex Style Citation:
@article{Adoni_2018,
author = {K. A. Adoni, A. S. Tavildar, K.K. Warhade},
title = {Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {228-238},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2421},
doi = {https://doi.org/10.26438/ijcse/v6i7.228238}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.228238}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2421
TI - Mitigating Randomized Selfish Behavior Attack Using Trust-Confidence Aware OLSR for Efficient Data Communications
T2 - International Journal of Computer Sciences and Engineering
AU - K. A. Adoni, A. S. Tavildar, K.K. Warhade
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 228-238
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
492 358 downloads 158 downloads
  
  
           

Abstract

Data communication performance of Mobile Ad-hoc Networks (MANETs) gets adversely affected by presence of malicious nodes. In this paper, model for random On/Off switching, referred as selfish or malicious nodes has been used, with OLSR protocol and a simple trust strategy has been proposed to decide the trust of next hop node. Residual energy level of forwarding node is also continuously monitored and accordingly confidence level associated with the node has been determined. Continuously varying trust parameter and confidence levels of all forwarding nodes have been incorporated in the Hello and Topology Control (TC) message formats of standard OLSR protocol. Further, OLSR protocol has been modified using Trust and Confidence values of nodes. The proposed protocol, termed as OLSRT-C, has been used to select the optimum path for data forwarding. Simulations carried out on typical MANET scenario show that the proposed OLSRT-C protocol successfully mitigates randomized Selfish Behavior (SB) attack significantly with marginal increase in the Average Energy Consumption per node.

Key-Words / Index Term

MANETs, Selfish Behavior attack, OLSR, Trust-Confidence routing, PDR, Routing Overheads, Average Energy Consumption

References

[1] T. Clausen, P. Jacquet: “Optimized Link State Routing Protocol OLSR”, IETF RFC-3626, 2003
[2] J. Wang, Y. Liu, Y. Jiao: “Building a trusted route in a mobile ad hoc network considering Communication reliability and path length”, Journal of Network and Computer Applications, 34(2011), pp. 1138-1149, 2011
[3] E. Perkins Charles, Bhagwat Pravin: “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, SIGCOMM 94 -8/94 London England UK, 1994
[4] C. E. Perkins, E. M. Royer: “Ad-hoc On-demand Distance Vector (AODV) Routing”, IETF-RFC-3561, The Internet Society, 2003
[5] D. B. Johnson, D. A. Maltz: “Dynamic Sources Routing (DSR) for Ad hoc Wireless Network”, IETF RFC-4728, 2007
[6] A. Rajaram, S. Palaniswami: “Malicious Node Detection System for Mobile Ad hoc Networks”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.1, No.(2) , pp. 77-85, 2010
[7] K. A. Adoni, A. S. Tavildar: “Probabilistic Modelling and Estimation of Network Blocking Probability for Selfish Behavior Attack in Mobile Ad hoc Networks”, IJCSN International Journal of Computer Science and Network,Vol.5, No.(4), pp. 653-659, August 2016
[8] K. A. Adoni, M. S. Karyakarte, A. S. Tavildar.: “Security Framework for Black Hole Attack in Mobile Ad-hoc Networks”, ICEIT National Conference on ‘Advances in Mobile Communications, Networking and Computing’, New Delhi, India, April 16-17, 2015, pp. 84-87, 2015
[9] Surya Aarohi: “Modelling of Malicious Behavior due to Detour Attack in OLSR Protocol in MANET”, Recent Researches in Electrical Engineering, pp. 276-283, 2014
[10] N. Suganthi, S. Neelavathy Pari,: “Detecting Malicious Nodes in MANET using Rateless Codes for maximum content ", 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, 17-19 December 2014, pp. 308-311, 2014
[11] Khaled Ahmed Abood Omer: “The Impact of Node Misbehavior on the performance of Routing Protocols in MANET”, International Journal of Computer Networks and Communications (IJCNC), Vol. 8, No.2, March 2016, pp. 103-112, 2016
[12] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya: “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science & Engineering, Volume 3, Issue 1, pp. 11-15, 2015.
[13] A.Vani: “Detection and Elimination of Wormhole Attacks in a MANET”, International Journal of Scientific Research in Computer Science & Engineering, Vol.5, Issue 5, pp-35-40, October (2017)
[14] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam: “Investigation Based Performance of Black anf Gray Hole Attack in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communications, Volume-1, Issue-4, Oct. 2013
[15] S. Geetha, G. Geetha Ramani: “Trust Model based on Bayesian Statistical method for AOMDV in MANET”, Journal of Theoretical and Applied Information Technology, Vol. 69, No. 1, November 2014, pp. 172-181, 2014
[16] Zia Ullah, Muhammad Saleem Khan, Idrees Ahmed, Nadeem Javaid, Majid I. Khan,: “Fuzzy Based Trust Model for Detection of Selfish Nodes in MANET”, International Conference on Advanced Information Networking and Application, Crans Montana, Switzerland, 23-25 March 2016, pp. 965-972, 2016
[17] Janakiraman Sengathir and Rajendiran Manoharan: “A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs”, EURASIP Journal on Wireless Communications and Networking (2015) 2015:158, pp. 1-13, 2015
[18] Hui Xia, Zhiping Jia, Xin Li, Lei Ju, Edwin H.M. Sha: “Trust Prediction and trust based source routing in mobile ad hoc networks”, Ad Hoc Networks, 11(2013) pp. 2096-2114, 2013
[19] L. Odedra, A. Revar, M. H. Lunagaria: “Detection and Prevention of Selfish Attack in MANET using Dynamic Learning”, IOSR Journal of Computer Engineering (IOSR-JCE), Ver. V, May-Jun. 2016, Vol.18, No.(3), pp. 54-61, 2016
[20] M. Roy, C. Chowdhury, S. Neogy: “Developing Secured MANET using Trust”, Fourth ICACC International Conference on Advances in Computing and Communication, Cochin, India, 2014, pp. 183-186, 2014
[21] W. Gong, Z. You, D. Chen, et al.: “Trust Based Malicious Nodes Detection in MANET”, International Conference on E-business and Information Security, EBISS-2009, Wuhan, China, 2009
[22] G. Soni, K. Chandrawanshi: “A Novel Defence Scheme against Selfish Node Attack in MANET”, International Journal on Computational Sciences and Applications (IJCSA), June 2013, Vol.3, No.(3), pp. 51-63, 2013
[23] N. Kirubakaran, A. Kathirval: “Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Network”, Asian Journal of Information Technology, 2014, Vol.13, No.(2), pp. 68-76, 2014
[24] J. M. Singh, P. Josh Kumar, Ayyaswamy Kathirvel, N. Kirubakaran, P. Sivaraman, M. Subramanian: “A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT”, EURASIP journal on Wireless Communication and Networking, 2015, 143, 2015
[25] D. G. Kampitaki, E. D. Karapistoli, A. A. Economides: “Evaluating Selfishness Impact on MANETs”, International Conference on Telecommunications and Multimedia (TEMU), Heraklion, Greece, 2014, pp. 64-68, 2014
[26] A. Banerjee, S. Neogy, C. Chowdhury: “Reputation Based Trust Management System for MANET”, Third International Conference on Engineering Applications of Information Technology (EAIT), Kolkata, India, 2012, pp. 376-381, 2012
[27] R. Venkataraman, M. Pushpalatha, T. R. Rao: “Regression-based trust model for mobile ad hoc networks”, IET Information Security, 2012, Vol.6, No.(3), pp. 131-140, 2012
[28] K. A. Adoni, A. S. Tavildar: “Trust aware routing framework for OLSR protocol to enhance performance of Mobile Ad-Hoc Networks”, International Conference on Pervasive Computing (ICPC), Pune, India, Jan-2015, pp. 1-7, 2015
[29] K. A. Adoni, R. D. Joshi: “Optimization of Energy consumption for OLSR routing protocol in MANE”, International Journal of Wireless and Mobile Networks, India, February 2012, Vol.4, No.(1), pp. 251-262, 2012
[30] F. Bai, A. Helmy: “A survey of Mobility Models in Wireless Adhoc Networks”, Study – Grant NSF Career Award 0134650, University of Southern California, USA