Skip to main content

Advertisement

Log in

A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The trustworthiness and connectivity of the network depends on the energy drain rate of mobile nodes. Colluders like vampire nodes in ad hoc network make it more vulnerable as they rapidly drain considerable amount of energy. This generic vampire attacks seem to capitalize on the potential features of the incorporated baseline protocol used for facilitating trustworthy data dissemination. The main goal of this paper is to formulate an attack prevention scheme that uses fuzzy trust relationship perspective for detecting vampire attacks and enforcing reduced energy drain rate of colluding mobile nodes. This fuzzy trust relationship perspective-based prevention mechanism (FTRPPM) initially estimates the associative trust and associative reputation of mobile nodes. Further, it quantifies the impact of factors that could induce vampire attack in the network under its influence. Finally, it facilitates the detection of vampire nodes based on the established ranges of threshold that are dynamically adjusted based on quantified level of probability factor. The empirical and simulation results of FTRPPM is confirmed to be exceptional as it ensures a remarkable improvement in mean PDR of 16% and mean throughput of 14% under the impact of increasing number of mobile nodes on par with the existing vampire attack mitigation schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Macker, J. P., & Corson, M. S. (2005). Mobile ad hoc networks (MANETs): Routing technology for dynamic wireless networking. Mobile Ad Hoc Networking, 2(1), 255–273.

    Article  Google Scholar 

  2. Feeney, L. M. (2005). Energy-efficient communication in ad hoc wireless networks. Mobile Ad Hoc Networking, 3(1), 301–327.

    Article  Google Scholar 

  3. Poturalski, M., Papadimitratos, P., & Hubaux, J. (2013). Formal analysis of secure neighbor discovery in wireless networks. IEEE Transactions on Dependable and Secure Computing, 10(6), 355–367.

    Article  Google Scholar 

  4. Papadimitratos, P., Poturalski, M., Schaller, P., Lafourcade, P., Basin, D., Capkun, S., et al. (2008). Secure neighborhood discovery: A fundamental element for mobile ad hoc networking. IEEE Communications Magazine, 46(2), 132–139.

    Article  Google Scholar 

  5. Zhong, S., & Wu, F. (2007). On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In Proceedings of the 13th annual ACM international conference on Mobile computing and networkingMobiCom’07 (Vol. 1, No. 2, pp. 33–42).

  6. Altman, E., Avrachenkov, K., & Garnaev, A. (2009). Jamming in wireless networks under uncertainty. In 2009 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (Vol. 1, No. 1, pp. 23–35).

  7. Jaramillo, J. J., & Srikant, R. (2007). DARWIN. In Proceedings of the 13th annual ACM international conference on Mobile computing and networkingMobiCom’07 (Vol. 1, No. 1, pp. 11–22).

  8. Li, F., & Wu, J. (2008). Hit and run: A Bayesian game between malicious and regular nodes in MANETs. In 2008 5th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (Vol. 2, No. 1, pp. 23–34).

  9. Li, X., Wu, Y., Xu, P., Chen, G., & Li, M. (2008). Hidden information and actions in multi-hop wireless ad hoc networks. In Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing and advancementMobiHoc’08 (Vol. 2, No. 1, pp. 12–24).

  10. Cardenas, A. A., Radosavac, S., & Baras, J. S. (2007). Performance comparison of detection schemes for MAC layer misbehavior. In IEEE INFOCOM 200726th IEEE international conference on computer communications (Vol. 1, No. 2, pp. 43–52).

  11. Joo, C., & Shroff, N. B. (2007). Performance of random access scheduling schemes in multi-hop wireless networks. In IEEE INFOCOM 200726th IEEE international conference on computer communications (Vol. 3, No. 1, pp. 24–31).

  12. Bhatia, R., Kashyap, A., & Li, L. (2007). The power balancing problem in energy constrained multi-hop wireless networks. In IEEE INFOCOM 200726th IEEE international conference on computer communications (Vol. 1, No. 1, pp. 67–78).

  13. Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networksSASN’05 (Vol. 2, No. 1, pp. 23–34).

  14. Aad, I., Hubaux, J., & Knightly, E. W. (2004). Denial of service resilience in ad hoc networks. In Proceedings of the 10th annual international conference on Mobile computing and networkingMobiCom’04 (Vol. 1, No. 1, pp. 45–56).

  15. Doshi, S., Bhandare, S., & Brown, T. X. (2002). An on-demand minimum energy routing protocol for a wireless ad hoc network. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 50.

    Article  Google Scholar 

  16. Fotino, M., & De, F. (2011). Energy issues and energy aware routing in wireless ad hoc networks. Mobile Ad-Hoc Networks: Protocol Design, 2(2), 45–61.

    Google Scholar 

  17. Stojmenovic, I., & Lin, X. (2001). Power-aware localized routing in wireless networks. IEEE Transactions on Parallel and Distributed Systems, 12(11), 1122–1133.

    Article  Google Scholar 

  18. Raikwar, M., & Mishra, P. (2017). A mitigation approach to protect wireless sensor networks over vampire attack. International Journal of Computer Applications, 159(7), 25–28.

    Article  Google Scholar 

  19. Vasserman, E. Y., & Hopper, N. (2013). Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Transactions on Mobile Computing, 12(2), 318–332.

    Article  Google Scholar 

  20. Ye, J., & Dang, Y. (2017). A novel grey fixed weight cluster model based on interval grey numbers. Grey Systems: Theory and Application, 2(2), 12–22.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Balaji Srikaanth.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balaji Srikaanth, P., Nagarajan, V. A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs. Wireless Pers Commun 101, 339–357 (2018). https://doi.org/10.1007/s11277-018-5691-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5691-8

Keywords

Navigation