Abstract
Securing mobile ad hoc networks (MANET) has been the interest of researchers recently because of its use in important security sectors such as police, rescue teams, and the military. One method to ensure a secure ad hoc network is to identify malicious nodes (hostile) from good nodes by their reputation based on the past experience of packet delivery. In this paper, we explore by applying reputation in various ways the effect to the throughput of a MANET ad hoc network. We simulate four different scenarios where the node reputation is evaluated to choose the most reliable route and eliminate the effect of malicious nodes performing gray-hole attack. One of the applied scenarios is a hybrid method where a sender node takes in consideration the reputation of all the nodes forming a route to choose the most reliable route. We find that by applying the hybrid method the performance of the network is the best and data packets are more likely to be delivered successfully to the intended destination in a very hostile environment.
Similar content being viewed by others
References
Deshmukh A (2015) Identifying misbehaving nodes in wireless sensor networks. Int J Eng Trends Technol 24(6):292–296
Almazyad A, Seddiq Y, Alotaibi A, Al-Nasheri A, BenSaleh M, Obeid A, Qasim S (2014) A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 14(2):3557–3577
Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688
Alkalbani A, Tap A, Mantoro T (2014) Evaluated reputation-based trust for WSN security. J Theor Appl Inf Technol 70(3):434–442
Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun Surveys Tutor. doi:10.1109/SURV.2011.042711.00083
Papadimitratos P, Hass ZJ (2003) Securing mobile ad hoc networks. In: The handbook of ad hoc wireless networks, pp 551–567. http://www.people.cornell.edu/pages/pp59/
Royer EM, Toh C-K (1999) A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers Commun. http://www.eecs.harvard.edu/~mdw/course/cs263/papers/royer-ieeepc99.pdf
Inkinen K (2004) New secure routing in ad hoc networks: study and evaluation of proposed schemes. In: Proceedings of internetworking 2004, Sjökulla, Finland. http://citeseer.ist.psu.edu/inkinen04new.html
Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of the SCS communication networks and distributed systems, modeling and simulating conference (CNDS 2002), pp 27–31. http://people.ece.cornell.edu/haas/wnl/Publications/cnds02.pdf
Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M (2006) Reputation and trust-based systems for ad hoc and sensor networks. Florida Atlantic University, Department of Computer Science and Engineering. www.cse.fau.edu/~jie/research/publications/Publication_files/trust.pdf
Srinivasan A, Teitelbaum J, Wu J (2006) Distributed reputation-based beacon trust system. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing
Hu J (2005) Cooperation in mobile ad hoc networks. Computer Science Department, Florida State University. http://www.cs.fsu.edu/research/reports/TR-050111.pdf
Xue Y, Nahrstedt K (2002) Bypassing misbehaving nodes in ad hoc routing. Tech. Department of Computer Science, University of Illinois at Urbana-Champaign. http://historical.ncstrl.org/tr/ps/uiuc_cs/UIUCDCS-R-2002-2306.ps
Dewan P, Dagupta P (2003) Trusting routers and relays in ad hoc networks. In: First international workshop on wireless security and privacy (WiSr 2003) in conjunction with IEEE 2003 international conference on parallel processing workshops (ICPP), Arizona State University. http://citeseer.ist.psu.edu/668343.html
Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Tenth international conference on proceedings ICPADS 2004, vol 7, No 9, pp 665–672. http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/9197/29171/01316153.pdf
Acknowledgments
This work is supported by the Research Center of College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Almazyad, A.S. Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks. Neural Comput & Applic 29, 597–607 (2018). https://doi.org/10.1007/s00521-016-2555-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-016-2555-6