Abstract
Multi-hop wireless networks have shown significant benefits in wireless communication, but they also face the internal multi-layer security threats. Since most security mechanisms require the cooperation of nodes, characterizing and learning the neighboring nodes’ actions and the evolution of these actions over time is vital. This paper proposes a new dynamic and multi-layer reputation computation model named CRM that couples conventional layered reputation computation model with multi-layer design and multi-level security technology to identify malicious nodes and preserve security against internal multi-layer threats. Simulation results and performance analyses demonstrate that CRM can provide rapid and accurate malicious node identification and management, and implement the security preserving against the internal multi-layer and bad mouthing attacks more effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
References
Khan, S., Loo, K.K., Din, Z.U.: Cross Layer Design for Routing and Security in Multi-hop Wireless Networks. Journal of Information Assurance and Security 4, 170–173 (2009)
Kamhoua, C.A., Pissinou, N., Makki, K.: Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks. In: Proceeding of IEEE ICC 2011, Kyoto, Japan (2011)
Salleh, N.M., Muhammad, M., Zakaria, M.S., Gannapathy, V.R., Suaidi, M.K., Ibrahim, I.M., AbdulAziz, M.Z.A., Johar, M.S., Ahmad, M.R.: Wireless Mesh Networks: Cross Layer Design Challenge. In: Proceeding of the ASIA-PACIFIC Conference on Applied Electromagnetics Proceedings, Melaka, Malaysia (2007)
Akyildiz, I.F., Wang, X.: Cross-Layer Design in Wireless Mesh Networks. IEEE Transactions on Vehicular Technology 57(2), 1061–1076 (2008)
Lu, W., Sundareshan, M.K.: A model for multilevel security in computer networks. IEEE Transactions on Software Engineering 16(6), 647–659 (1990)
Luo, J., Liu, X., Fan, M.: A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Network 53(14), 2396–2407 (2009)
Laniepce, S., Lancieri, L., Achemlal, M., Bouabdallah, A.: A cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks. In: Proceeding of the IWCMC, Caen, France, pp. 296–300 (2010)
Liu, Y., Li, K., Jin, Y., Zhang, Y., Qu, W.: A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Generation Computer Systems 27(5), 547–554 (2011)
Long, X., Joshi, J.: BaRMS: A Bayesian Reputation Management Approach for P2P Systems. In: Proceeding of the IEEE IRI, Las Vegas, Nevada, USA, pp. 147–152 (2010)
Khan, S., Loo, K.-K., Mast, N., Naeem, T.: SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management 18(2), 190–209 (2010)
Lin, H., Ma, J., Hu, J., Yang, K.: PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking 2012, 69 (2012)
Lin, H., Ma, J., Hu, J.: SLCRM: Subject Logic Based Cross layer Reputation Mechanism for Wireless Mesh Networks. China Communications 19(10), 40–49 (2012)
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A Survey of Trust and Reputation Management Systems in Wireless Communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)
Li, F., Wu, J.: Uncertainty Modeling and Reduction in MANETs. IEEE Transactions on Mobile Computing 9(7), 1035–1048 (2010)
Noack, A.: Trust agreement in wireless mesh networks. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 336–350. Springer, Heidelberg (2011)
Shila, D.M., Cheng, Y., Anjali, T.: Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs. IEEE Transactions on Wireless Communications 9(5), 1661–1675 (2010)
Zhai, H., Chen, X., Fang, Y.: How well can the IEEE 802.11 wireless LAN support quality of service? IEEE Transactions on Wireless Communications 4(6), 3084–3094 (2005)
Gandikota, V.R., Tamma, B.R., Siva Ram Murthy, C.: Adaptive FEC-Based Packet Loss Resilience Scheme for Supporting Voice Communication over Ad Hoc Wireless Networks. IEEE Transactions on Mobile Computing 7(10), 1184–1199 (2008)
Chen, M.: OPNET Network Simulation. Tsinghua University Press, Beijing (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hu, J., Lin, H., Xu, L. (2013). A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)