Skip to main content
Log in

A statistical trust system in wireless mesh networks

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Most trust and reputation solutions in wireless mesh networks (WMNs) rely on the intrusion detection system (IDS) Watchdog. Nevertheless, Watchdog does not consider packet loss on wireless links and may generate false positives. Consequently, a node that suffers from packet loss on one of its links may be accused wrongly, by Watchdog, of misbehaving. To deal with this issue, we propose in this paper a novel trust system which considers packet loss of links. Our trust system is based on a statistical detection method (SDM) implemented on each node of the network. Firstly, the SDM, via CUSUM test, analyzes the behavior of the packets loss in order to detect a dropping attack. Secondly, the SDM, through the Kolmogorov-Smirnov test, compares the behavior of the total packets loss with that of the control packets in order to identify the attack type. Our system allows every WMN’s node to assign to each of its neighbors, a trust value which reflects its real behavior. We have validated the proposed SDM method via extensive simulations on ns2 and have compared our trust system with an existing solution. The results display that our SDM solution offers better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw ISDN Syst:445–487

  2. Ekici E, Vuran M (2010) Wireless heterogeneous networks and next generation internet. Mobile Networks and Applications, pp 607–609

  3. Dromard J, Khoukhi L, Khatoun R (2013) An efficient admission control model based on dynamic link scheduling in wireless mesh networks. EURASIP J Wirel Commun Netw 2013(1)

  4. Waharte S, Xiao J, Boutaba R (2008) Sensor-based architecture for qos provisioning and fast handoff management in wlans. Ann Telecommun 63(3-4):137–148

    Article  Google Scholar 

  5. Salem NB, Hubaux J-P (2006) Securing wireless mesh networks. IEEE Wireless Communications, pp 50–55

  6. Ieee standard for information technology-specific requirements part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 10: Mesh networking (2011). IEEE Std 802.11s-2011

  7. Bin H, Gharavi H (2014) Smart grid mesh network security using dynamic key distribution with merkle tree 4-way handshaking. IEEE Trans Smart Grid 5(2):550–558

    Article  Google Scholar 

  8. Hamid Md.A, Abdullah-Al-Wadud M, Hong C, Chae O, Lee S (2009) A robust security scheme for wireless mesh enterprise networks. Ann Telecommun 64(5-6):401–413

    Article  Google Scholar 

  9. Nabet A, Khatoun R, Khoukhi L, Dromard J, Gaiti D (2011) Towards secure route discovery protocol in manet. In: Global Information Infrastructure Symposium (GIIS), 2011, pp 1–8

  10. Safaei Z, Sabaei M, Torgheh F (2010) An efficient reputation-based mechanism to enforce cooperation in manets. In: Proceedings of the 4th international conference on Communications and information technology

  11. Han Y, Shen Z, Miao C, Leung C, Niyato D (2010) A Survey of Trust and Reputation Management Systems in Wireless Communications. Proceedings of the IEEE, pp 1755–1772

  12. Dromard J, Khatoun R, Khoukhi L (2013) A watchdog extension scheme considering packet loss for a reputation system in wireless mesh network. In: Telecommunications (ICT), 2013 20th International Conference on, pp 1–5

  13. Han Y, Shen Z, Miao C, Leung C, Niyato D (2010) A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE

  14. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking

  15. Buchegger S, Boudec J-YL (2002) Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, MobiHoc ’02

  16. JĀžsang A, Ismail R, Boyd C (2006) A survey of trust and reputation systems for online service provision

  17. Sen J (2010) A distributed trust and reputation framework for mobile ad hoc networks. CoRR

  18. Yih-Chun H, Perrig A (2004) A survey of secure wireless ad hoc routing, pp 28–39

  19. Sen J, Koilakonda S, Ukil A (2011) A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. CoRR

  20. Hu Y-C, Perrig A, Johnson DB Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw:21– 38

  21. Li Y (2011) A reputation system for wireless mesh network using multi-path routing protocol. In: Zhong S, Dou D, Wang Y (eds) IPCCC. IEEE

  22. Tan H (2011) Ramp: a reputation-aware multi-hop routing protocol in wireless ad-hoc networks. In: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM, NY, USA

  23. Li W, Parker J, Joshi A (2012) Security through collaboration and trust in manets:342–352

  24. Aguayo D, Bicket J, Biswas S, Judd G, Morris R (2004) Link-level measurements from an 802.11b mesh network. In: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, NY, USA, pp 121–132

  25. Javaid N, Bibi A, Javaid A, Khan ZA, Latif K, Ishfaq M (2014) Investigating quality routing link metrics in wireless multi-hop networks. Ann Telecommun 69(3-4):209–217

    Article  Google Scholar 

  26. Peng S, Yang A, Zhong H, Feng Z (2013) A dynamic trust updating model based on multiple constraints in wireless mesh networks. In: Information Science and Technology (ICIST), 2013 International Conference on, pp 815–819

  27. Yao Y, Peng Y, Yinpeng Y, Rao T (2014) A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks. Comput Electr Eng 40(2):663–672

    Article  Google Scholar 

  28. Zaidi Z, Landfeldt B (2008) Monitoring assisted robust routing in wireless mesh networks. Mobile Networks and Applications, pp 54–66

  29. Essonne NJ (1990) Département de mathématiques appliquées Ecole polytechnique (Palaiseau, Introduction aux probabilités. Ecole Polytechnique, Massy-Palaiseau

    Google Scholar 

  30. Page ES (1954) Continuous inspection schemes. Biometrika 41(1/2):100–115

    Article  MathSciNet  MATH  Google Scholar 

  31. Montgomery DC (2009) Introduction to statistical quality control. Wiley, New York, NY

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rida Khatoun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khatoun, R., Begriche, Y., Dromard, J. et al. A statistical trust system in wireless mesh networks. Ann. Telecommun. 71, 187–199 (2016). https://doi.org/10.1007/s12243-015-0488-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-015-0488-1

Keywords

Navigation