Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs
Autor: | G Nagaraja, Pradeep Reddy Ch |
---|---|
Rok vydání: | 2016 |
Předmět: |
Group key management
General Computer Science business.industry Computer science Node (networking) General Engineering 020302 automobile design & engineering 020206 networking & telecommunications Context (language use) 02 engineering and technology Mobile ad hoc network Computer security computer.software_genre 0203 mechanical engineering System failure 0202 electrical engineering electronic engineering information engineering Network performance Direct experience business computer Lying Computer network |
Zdroj: | International Journal of Intelligent Engineering and Systems. 9:215-224 |
ISSN: | 2185-3118 |
DOI: | 10.22266/ijies2016.1231.23 |
Popis: | Instant collaborative group communication can be achieved by deploying Mobile Ad Hoc Networks (or MANETs) without any pre-plan and pre-existing infrastructure setup. However, the curbs thrown by these networks, motivate the necessity of a group key management framework to secure data traffic. In this context, significant research work done in the last decade and proved that the trust based frameworks deliver better performance than others. In MANETs, trust quantified as the belief held by a node about another node. It is evaluated based on the assessing node direct experiences with assessed node itself, if they are neighbors and recommendations from remote nodes in the network with which assessed node has a direct experience, if they are remote. However, the framework based on recommendations by other nodes in the network might ultimately lead to system failure due to the menace of unfair recommendations by selfish and malicious nodes. Lying and on-off attacks on the system are such type of attacks. This motivates us to work on a framework which is immune to aforesaid attacks and should be lightweight due to node's has limited computing resources. We propose a framework which scrutinizes dishonest recommendations based on the trust threshold value of remote nodes, distance from mean of trust recommendations and by maintaining a history of recommendations. Our simulation outcomes prove that proposed framework can deliver better network performance and resistance to lying and on-off attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |