Abstract

Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

Highlights

  • Mobile ad hoc networks (MANETs) are self-organized networks which require distributed, reliable, and flexible networks which provide interdependency and rational decisionmaking

  • Our approach is unique in that (1) each node in the MANET is defined by a security characteristic function for the coalition formation, (2) each node uses a reputation mechanism to accurately detect insider jamming attack, (3) each node maintains a history of transmission rates for nodes in the coalition, and (4) the combination of transmission rates and reputation values for nodes in the coalition is used to detect insider attacker and exclude it from the coalition

  • We have been able to show through simulation that a reputation-based coalitional game can help prevent insider attacks in a mobile ad hoc network

Read more

Summary

Introduction

Mobile ad hoc networks (MANETs) are self-organized networks which require distributed, reliable, and flexible networks which provide interdependency and rational decisionmaking. Different from existing works [15, 16] which made use of an alibi-based protocol and a self-healing protocol, respectively, to either detect or recover from a jamming attack, we make use of a reputation-based coalition game to ensure security in the network These approaches are too generalized and might not be implementable for a mobile ad hoc network for which our system is modeled. Instead, follows a game-theoretic approach by (1) implementing a coalition formation algorithm, (2) maintaining the coalition via a reputation mechanism, (3) identifying the insider attackers by setting up a reputation threshold, and (4) excluding the attackers from the coalition by rerouting their paths and randomly changing their channel of transmission This method is fully distributed and does not rely on any trusted central entity to operate at optimal performance. The rest of this paper is organized as follows: in Section 2, we presented relevant works that are closely related to our approach; in Section 3, we presented the network and jammer model; Section 4 describes the proposed defense model; in Section 5, we provide the simulation and result of the model; and, in Section 6, we conclude and present future work

Related Work
Network and Jammer Model
The Proposed Defense Model
Simulation and Results
Scenario One
Scenario Two
Scenario Three
Conclusion and Future Work
C: Coalition of nodes

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.