Skip to main content

A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

  • 3600 Accesses

Abstract

Multi-hop wireless networks have shown significant benefits in wireless communication, but they also face the internal multi-layer security threats. Since most security mechanisms require the cooperation of nodes, characterizing and learning the neighboring nodes’ actions and the evolution of these actions over time is vital. This paper proposes a new dynamic and multi-layer reputation computation model named CRM that couples conventional layered reputation computation model with multi-layer design and multi-level security technology to identify malicious nodes and preserve security against internal multi-layer threats. Simulation results and performance analyses demonstrate that CRM can provide rapid and accurate malicious node identification and management, and implement the security preserving against the internal multi-layer and bad mouthing attacks more effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khan, S., Loo, K.K., Din, Z.U.: Cross Layer Design for Routing and Security in Multi-hop Wireless Networks. Journal of Information Assurance and Security 4, 170–173 (2009)

    Google Scholar 

  2. Kamhoua, C.A., Pissinou, N., Makki, K.: Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks. In: Proceeding of IEEE ICC 2011, Kyoto, Japan (2011)

    Google Scholar 

  3. Salleh, N.M., Muhammad, M., Zakaria, M.S., Gannapathy, V.R., Suaidi, M.K., Ibrahim, I.M., AbdulAziz, M.Z.A., Johar, M.S., Ahmad, M.R.: Wireless Mesh Networks: Cross Layer Design Challenge. In: Proceeding of the ASIA-PACIFIC Conference on Applied Electromagnetics Proceedings, Melaka, Malaysia (2007)

    Google Scholar 

  4. Akyildiz, I.F., Wang, X.: Cross-Layer Design in Wireless Mesh Networks. IEEE Transactions on Vehicular Technology 57(2), 1061–1076 (2008)

    Article  Google Scholar 

  5. Lu, W., Sundareshan, M.K.: A model for multilevel security in computer networks. IEEE Transactions on Software Engineering 16(6), 647–659 (1990)

    Article  Google Scholar 

  6. Luo, J., Liu, X., Fan, M.: A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Network 53(14), 2396–2407 (2009)

    Article  MATH  Google Scholar 

  7. Laniepce, S., Lancieri, L., Achemlal, M., Bouabdallah, A.: A cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks. In: Proceeding of the IWCMC, Caen, France, pp. 296–300 (2010)

    Google Scholar 

  8. Liu, Y., Li, K., Jin, Y., Zhang, Y., Qu, W.: A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Generation Computer Systems 27(5), 547–554 (2011)

    Article  Google Scholar 

  9. Long, X., Joshi, J.: BaRMS: A Bayesian Reputation Management Approach for P2P Systems. In: Proceeding of the IEEE IRI, Las Vegas, Nevada, USA, pp. 147–152 (2010)

    Google Scholar 

  10. Khan, S., Loo, K.-K., Mast, N., Naeem, T.: SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management 18(2), 190–209 (2010)

    Article  Google Scholar 

  11. Lin, H., Ma, J., Hu, J., Yang, K.: PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking 2012, 69 (2012)

    Google Scholar 

  12. Lin, H., Ma, J., Hu, J.: SLCRM: Subject Logic Based Cross layer Reputation Mechanism for Wireless Mesh Networks. China Communications 19(10), 40–49 (2012)

    Google Scholar 

  13. Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A Survey of Trust and Reputation Management Systems in Wireless Communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)

    Article  Google Scholar 

  14. Li, F., Wu, J.: Uncertainty Modeling and Reduction in MANETs. IEEE Transactions on Mobile Computing 9(7), 1035–1048 (2010)

    Article  Google Scholar 

  15. Noack, A.: Trust agreement in wireless mesh networks. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 336–350. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  16. Shila, D.M., Cheng, Y., Anjali, T.: Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs. IEEE Transactions on Wireless Communications 9(5), 1661–1675 (2010)

    Article  Google Scholar 

  17. Zhai, H., Chen, X., Fang, Y.: How well can the IEEE 802.11 wireless LAN support quality of service? IEEE Transactions on Wireless Communications 4(6), 3084–3094 (2005)

    Article  Google Scholar 

  18. Gandikota, V.R., Tamma, B.R., Siva Ram Murthy, C.: Adaptive FEC-Based Packet Loss Resilience Scheme for Supporting Voice Communication over Ad Hoc Wireless Networks. IEEE Transactions on Mobile Computing 7(10), 1184–1199 (2008)

    Article  Google Scholar 

  19. Chen, M.: OPNET Network Simulation. Tsinghua University Press, Beijing (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, J., Lin, H., Xu, L. (2013). A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics