Skip to main content

Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2018)

Abstract

One of the major security issues common in any trust and reputation management mechanism is Bad mouthing in which malicious participants victimize nodes with high reputations by giving lower or negative feedbacks in order to undermine them. Opportunistic Networks are more vulnerable to this type of attacks as there is no pre defined path between the source and the destination. Hence it is important to ensure the trustworthiness or reliability of the next-hop nodes as the nodes communicates by forwarding the message to the next hop using opportunistic connectivity due to node proximity. Otherwise there is the risk of malicious nodes interrupting secure transmission, thus affecting the performance of the network. To deal with this issue of Bad mouthing due to the presence of malicious nodes in the network, we have proposed and implemented a Reputation based Trust Management Model using Friendship vector (RTMF). We have compared the performance of our algorithm with an existing Trust management system based on Ontology and it has been observed that RTMF has successfully reduced the negative effect of the presence of malicious nodes and improved the performance of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ayday, E., Fekri, F.: An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Trans. Mob. Comput. 11, 1514–1531 (2012)

    Article  Google Scholar 

  2. Goncalves, M.R.P, Moreira, E.S., Martimiano, L.A.F.: Trust management in opportunistic networks. In: 9th International Conference on Networks. IEEE, France (2010)

    Google Scholar 

  3. Capkun, S., Hubaux, J.-P., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5, 43–51 (2006)

    Article  Google Scholar 

  4. Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)

    Article  MathSciNet  Google Scholar 

  5. Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C.D., Poslad, S., Dimitrakos, T. (eds.) Proceedings of the 2nd International Conference on Trust Management (iTrust). LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Google Scholar 

  6. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad-hoc networks. In: Proceedings of the 6th ACM MobiCom and Networking, Boston, pp. 255–265 (2000)

    Google Scholar 

  7. Paul, K., Westhoff, D.: Context aware detection of selfish nodes in DSR based ad-hoc networks. In: Global Telecommunications Conference GLOBECOM. IEEE, Taiwan (2002)

    Google Scholar 

  8. Buchegger, S., Boudec, J.: Performance analysis of CONFIDANT protocol: cooperation of nodes: fairness in dynamic ad-hoc networks. In: Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing MobiHoc, Switzerland, pp. 226–236 (2002)

    Google Scholar 

  9. Buchegger, S., Boudec, J.: A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of Second Workshop the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  10. Ayday, E., Fekri, F.: Using node accountability in credential based routing for mobile ad-hoc networks. In: Proceedings of 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Atlanta (2008)

    Google Scholar 

  11. Ayday, E., Fekri, F.: A protocol for data availability in mobile ad-hoc networks in the presence of insider attacks. Ad Hoc Netw. 8(2), 181–192 (2010)

    Article  Google Scholar 

  12. Dewan, P., Dasgupta, P., Bhattacharya, A.: On using reputations in ad-hoc networks to counter malicious nodes. In: Proceedings of 10th International Conference on Parallel and Distributed Systems, ICPADS 2004 (2004)

    Google Scholar 

  13. Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)

    Article  Google Scholar 

  14. Yu, W., Liu, K.R.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad-hoc networks. IEEE Trans. Mob. Comput. 6(5), 507–521 (2007)

    Article  Google Scholar 

  15. Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, USA (2010)

    Google Scholar 

  16. Hobbie, R.K., Roth, B.J.: Exponential growth and decay. In: Intermediate Physics for Medicine and Biology, pp. 31–47. Springer, New York (2007)

    Google Scholar 

  17. Keranen, A., Ott, J., Karkkaiene, T.: The ONE simulator for DTN protocol evaluation. In: ICST Proceedings of the 2nd International Conference on Simulation Tools, pp. 1–10 (2009)

    Google Scholar 

  18. ONE Homepage. https://www.netlab.tkk.fi/tutkimus/dtn/theone/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Smritikona Barai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Barai, S., Boral, N., Bhaumik, P. (2019). Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management. In: Abraham, A., Gandhi, N., Pant, M. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2018. Advances in Intelligent Systems and Computing, vol 939. Springer, Cham. https://doi.org/10.1007/978-3-030-16681-6_34

Download citation

Publish with us

Policies and ethics