Abstract
One of the major security issues common in any trust and reputation management mechanism is Bad mouthing in which malicious participants victimize nodes with high reputations by giving lower or negative feedbacks in order to undermine them. Opportunistic Networks are more vulnerable to this type of attacks as there is no pre defined path between the source and the destination. Hence it is important to ensure the trustworthiness or reliability of the next-hop nodes as the nodes communicates by forwarding the message to the next hop using opportunistic connectivity due to node proximity. Otherwise there is the risk of malicious nodes interrupting secure transmission, thus affecting the performance of the network. To deal with this issue of Bad mouthing due to the presence of malicious nodes in the network, we have proposed and implemented a Reputation based Trust Management Model using Friendship vector (RTMF). We have compared the performance of our algorithm with an existing Trust management system based on Ontology and it has been observed that RTMF has successfully reduced the negative effect of the presence of malicious nodes and improved the performance of the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ayday, E., Fekri, F.: An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Trans. Mob. Comput. 11, 1514–1531 (2012)
Goncalves, M.R.P, Moreira, E.S., Martimiano, L.A.F.: Trust management in opportunistic networks. In: 9th International Conference on Networks. IEEE, France (2010)
Capkun, S., Hubaux, J.-P., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5, 43–51 (2006)
Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)
Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C.D., Poslad, S., Dimitrakos, T. (eds.) Proceedings of the 2nd International Conference on Trust Management (iTrust). LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad-hoc networks. In: Proceedings of the 6th ACM MobiCom and Networking, Boston, pp. 255–265 (2000)
Paul, K., Westhoff, D.: Context aware detection of selfish nodes in DSR based ad-hoc networks. In: Global Telecommunications Conference GLOBECOM. IEEE, Taiwan (2002)
Buchegger, S., Boudec, J.: Performance analysis of CONFIDANT protocol: cooperation of nodes: fairness in dynamic ad-hoc networks. In: Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing MobiHoc, Switzerland, pp. 226–236 (2002)
Buchegger, S., Boudec, J.: A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of Second Workshop the Economics of Peer-to-Peer Systems (2004)
Ayday, E., Fekri, F.: Using node accountability in credential based routing for mobile ad-hoc networks. In: Proceedings of 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Atlanta (2008)
Ayday, E., Fekri, F.: A protocol for data availability in mobile ad-hoc networks in the presence of insider attacks. Ad Hoc Netw. 8(2), 181–192 (2010)
Dewan, P., Dasgupta, P., Bhattacharya, A.: On using reputations in ad-hoc networks to counter malicious nodes. In: Proceedings of 10th International Conference on Parallel and Distributed Systems, ICPADS 2004 (2004)
Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)
Yu, W., Liu, K.R.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad-hoc networks. IEEE Trans. Mob. Comput. 6(5), 507–521 (2007)
Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, USA (2010)
Hobbie, R.K., Roth, B.J.: Exponential growth and decay. In: Intermediate Physics for Medicine and Biology, pp. 31–47. Springer, New York (2007)
Keranen, A., Ott, J., Karkkaiene, T.: The ONE simulator for DTN protocol evaluation. In: ICST Proceedings of the 2nd International Conference on Simulation Tools, pp. 1–10 (2009)
ONE Homepage. https://www.netlab.tkk.fi/tutkimus/dtn/theone/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Barai, S., Boral, N., Bhaumik, P. (2019). Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management. In: Abraham, A., Gandhi, N., Pant, M. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2018. Advances in Intelligent Systems and Computing, vol 939. Springer, Cham. https://doi.org/10.1007/978-3-030-16681-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-16681-6_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16680-9
Online ISBN: 978-3-030-16681-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)