Skip to main content
Log in

Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Securing mobile ad hoc networks (MANET) has been the interest of researchers recently because of its use in important security sectors such as police, rescue teams, and the military. One method to ensure a secure ad hoc network is to identify malicious nodes (hostile) from good nodes by their reputation based on the past experience of packet delivery. In this paper, we explore by applying reputation in various ways the effect to the throughput of a MANET ad hoc network. We simulate four different scenarios where the node reputation is evaluated to choose the most reliable route and eliminate the effect of malicious nodes performing gray-hole attack. One of the applied scenarios is a hybrid method where a sender node takes in consideration the reputation of all the nodes forming a route to choose the most reliable route. We find that by applying the hybrid method the performance of the network is the best and data packets are more likely to be delivered successfully to the intended destination in a very hostile environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Deshmukh A (2015) Identifying misbehaving nodes in wireless sensor networks. Int J Eng Trends Technol 24(6):292–296

    Article  Google Scholar 

  2. Almazyad A, Seddiq Y, Alotaibi A, Al-Nasheri A, BenSaleh M, Obeid A, Qasim S (2014) A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 14(2):3557–3577

  3. Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688

  4. Alkalbani A, Tap A, Mantoro T (2014) Evaluated reputation-based trust for WSN security. J Theor Appl Inf Technol 70(3):434–442

  5. Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun Surveys Tutor. doi:10.1109/SURV.2011.042711.00083

  6. Papadimitratos P, Hass ZJ (2003) Securing mobile ad hoc networks. In: The handbook of ad hoc wireless networks, pp 551–567. http://www.people.cornell.edu/pages/pp59/

  7. Royer EM, Toh C-K (1999) A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers Commun. http://www.eecs.harvard.edu/~mdw/course/cs263/papers/royer-ieeepc99.pdf

  8. Inkinen K (2004) New secure routing in ad hoc networks: study and evaluation of proposed schemes. In: Proceedings of internetworking 2004, Sjökulla, Finland. http://citeseer.ist.psu.edu/inkinen04new.html

  9. Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of the SCS communication networks and distributed systems, modeling and simulating conference (CNDS 2002), pp 27–31. http://people.ece.cornell.edu/haas/wnl/Publications/cnds02.pdf

  10. Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M (2006) Reputation and trust-based systems for ad hoc and sensor networks. Florida Atlantic University, Department of Computer Science and Engineering. www.cse.fau.edu/~jie/research/publications/Publication_files/trust.pdf

  11. Srinivasan A, Teitelbaum J, Wu J (2006) Distributed reputation-based beacon trust system. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing

  12. Hu J (2005) Cooperation in mobile ad hoc networks. Computer Science Department, Florida State University. http://www.cs.fsu.edu/research/reports/TR-050111.pdf

  13. Xue Y, Nahrstedt K (2002) Bypassing misbehaving nodes in ad hoc routing. Tech. Department of Computer Science, University of Illinois at Urbana-Champaign. http://historical.ncstrl.org/tr/ps/uiuc_cs/UIUCDCS-R-2002-2306.ps

  14. Dewan P, Dagupta P (2003) Trusting routers and relays in ad hoc networks. In: First international workshop on wireless security and privacy (WiSr 2003) in conjunction with IEEE 2003 international conference on parallel processing workshops (ICPP), Arizona State University. http://citeseer.ist.psu.edu/668343.html

  15. Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Tenth international conference on proceedings ICPADS 2004, vol 7, No 9, pp 665–672. http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/9197/29171/01316153.pdf

Download references

Acknowledgments

This work is supported by the Research Center of College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulaziz S. Almazyad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Almazyad, A.S. Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks. Neural Comput & Applic 29, 597–607 (2018). https://doi.org/10.1007/s00521-016-2555-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-016-2555-6

Keywords

Navigation