Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs
S. Parthiban*, Paul Rodrigues
Faculty of Engineering, Department of Computer Science and Engineering, DMI College of Engineering, Affiliated to Anna University, Chennai, India
Abstract
In multi-hop networks like MANETs, the mobile nodes relies upon the intermediate nodes for routing the packets. But, the existence of root node attack in an ad hoc environment may degrade the network performance. Hence, the critical issues that could arise due to the existence of root node attack are considered as one of the important research issues to be solved. In this paper, we propose a Kuder – Richardson Reputation Co-efficient based Cooperation Enforcement Mechanism (KRRCM) for mitigating Root node attack based on Kuder – Richardson Reputation Co-efficient (KRRC) that quantifies the reputation level of mobile node. This Kuder – Richardson Reputation Co-efficient is calculated based on second hard reputation. The coefficient value obtained through KRRCM approach reflects an individual root node’s behaviour in relation to cooperation, so that the particular node can be selected as core point for group communication. The performance analysis of KRRCM carried out based on ns-2 simulator and the proposed KRRCM approach outperforms the existing mechanisms by increasing the packet delivery ratio and throughput by 23% and 28%, while decreasing the control overhead and total overhead in an average by 18% and 29% respectively. Further, KRRCM ideally mitigates the root node attack at a faster rate of 32% than the considered benchmark mechanism considered for investigation.
Keywords
Root Node Attack, MAODV, Kuder – Richardson Reputation Co-efficient, Threshold Detection Point, Group Communication, Packet Drop Variance
Received:April 6, 2015
Accepted: May 8, 2015
Published online: June 8, 2015
@ 2015 The Authors. Published by American Institute of Science. This Open Access article is under the CC BY-NC license. http://creativecommons.org/licenses/by-nc/4.0/
1. Introduction
Mobile ad hoc network is a composition of active mobile nodes which communicate each other without relying on a centralized infrastructure. In this network, nodes are free to move in an arbitrary fashion and hence the topology of the network is highly dynamic in nature [1]. In the dynamic topology, the mobile nodes present in a particular range can communicate directly, whereas the nodes present outside the communication range make use of intermediate nodes to transfer a data packet to its destiny and this type of transmission may be called as multi-hop routing [2]. In this multi-hop routing, the probability of a node participating in a routing activity is highly dependent on the reputation factor of the node. The reputation factor of a mobile node reflects the reliability and cooperativity of the particular mobile node to participate in a routing activity. But, there are some classes of mobile nodes which do not actively participate in the routing activity and drops many packets without transmitting to the next intermediate or to the destiny node [3]. In general, such classes of nodes are known as malicious nodes, which by its activity drastically reduce the network performance.
Although, researchers have put forward large number of techniques, to detect and mitigate various types of malicious attacks in MANETs, most of the proposed approaches were mainly framed for unicast routing activity [4]. The influence of malicious attacks on the multicast application has not been explored in the literature. This paper focuses on detecting and mitigating malicious nodes in a multicast routing activity by making use of MAODV protocol. The MAODV protocol is a tree based protocol, in which the data dissemination from source group to destination group is done through the rendezvous point present in each multicast group. This meeting point may be called as root node, which is chosen from the group of mobile nodes according its reputation factor. Hence, in this paper, we propose a Kuder Richardson Reputation Coefficient Based Reputation Mechanism (KRRCM) for mitigating root node attack in MANETs. The proposed KRRCM approach manipulates Kuder Richardson Reputation Coefficient for each and every mobile node. The coefficient values obtained through KRRCM approach reflects the nodes behaviour, either cooperative or non-cooperative, according to which the particular node can be selected as rendezvous point for group communication.
2. Related Work
In the literature, researchers have proposed a variety of mitigation mechanism for detecting root node attack. Some of them are enumerated below:
In [5], a novel mitigation framework was proposed for integrating a routing protocol known as reactive multicast protocol that performs reliable data transmission by grouping nodes in the form of shared meshes. This framework mainly investigates reliable packet delivery in a shortest routing distance. A trust management framework has been proposed in [6] which enable the cooperation among the mobile nodes. In this, authors have incorporated a hardware module named as tamper resistant module to detect and mitigate malicious behaviour of the mobile node.
A novel mechanism [7] mitigates various types of attacks that are possible with multicast tree routing protocol. various issues related to route discovery and route establishment by designing new control messages such as RREP-INV, MACT (J) –MTF and RREP-INV, MACT (P) –PART. A collaborative mechanism [8] was investigated a based on Watch Dog, Path-rater and IDS which does the monitoring of reliable data transfer among the mobile nodes and also the key manipulation operations performed by each and every mobile node. These mechanisms provide reactive solution to predict the existence of any type of attack by determining the reputation factor of the mobile node.
Furthermore, a reliable mitigation mechanism was proposed in [9] that could provide a solution to the recovery of root node in case of shared tree network. Authors have implemented a bootstrap router which could able to perform efficient routing based on rendezvous point mechanism. A novel routing mechanism [10] based on the auction concept was proposed that selects the routing path according to the minimum cost calculated from the individual node bids. This mechanism also manipulates the payment that should be given for the winning routing path which is equivalent to that of the second smallest biding route.
In addition to this, A one-way hash function mechanism [11] was proposed to estimate the genuinenity factor of a mobile node. This hash function was computed based on both the information obtained from the mobile nodes and its neighbour nodes. This paper also investigates on fault tolerance and fault recovery technique for the network through explicit acknowledgement scheme.
Yet another, a novel trust based mitigation mechanism have been proposed in [12] which detects the malicious nodes based on Dempster-Shafer Theory. This mechanism manipulates a reputation factor for each and every mobile node based on second hand information using posterior probability.
3. Kuder – Richardson Reputation Co-efficient Based Cooperation Enforcement Mechanism (KRRCM)
KRRCM is presented for mitigating Root node attack in an ad hoc environment. In this mechanism, the detection of Root node attack is based upon a factor called Kuder – Richardson Reputation Co-efficient (KRRC), which aids in estimating the reputation level of each and every mobile node and enables effective and efficient mitigation of root node attack from the routing path established between the multicast groups.
Let us consider the number of packets received by a mobile node shall be and the number of packets forwarded by mobile node as for‘s’ sessions.
The number of packets dropped by a mobile node in any particular session says in session, can be given in (1),
(1)
Then, the average packet drop in ‘s’ sessions is computed by (2),
(2)
Based on the values of for ‘s’ sessions andthe number of packets received by a mobile node in a session, the total variance in packet delivery of mobile node in each session is given in (3),
(3)
Based on (3), Kuder – Richardson Reputation Co-efficient is manipulated through (4),
(4)
Here, the values of KRRC is analyzed, if it is found to be less than 0.40 (as obtained through simulations) then the node is said to be malicious node affected by means of root node attack and isolated from the routing path. At the same time, if the value is equal to or greater than 0.40, then the mobile node is said to be cooperative node.
4. Algorithm for the Computation of Kuder – Richardson Reputation Co-efficient
Algorithm1:
Notations:
- Number of mobile nodes in the network
- Number of sessions
- Number of packets received by a mobile node
- Number of packets received by a mobile node
1. Begin
2. For each mobile node in the network,
3. For each session of packet transmission,
4. Find the packet dropped,
5. Find the average drop rate as,
6. Total Variance in packet delivery as
7. Compute the KRRC using ;
8. End for
9. For each mobile node in the network,
10. If , then
11. The mobile node is said to malicious node
12. Else is the cooperative node.
13. End if
14. End
In MAODV protocol, if the source needs to establish the route to the destination then it is carried by broadcasting RREQ packets through the forward route and determines an optimal route to the destination through RREP packets. When the source node sends the multicast packet to the destination nodes, the group leader of each multicast group may be compromised. This is estimated through the neighbor information obtained from each and every node .In the first step, the mechanism identifies the average drop rate. In the second step they calculate the total variance in packet delivery .In the third step KRRC is calculated by using Eq., (4). In the last step, If the KRRC value is below a threshold value of 0.4, then the root node is mitigated or else the normal routing of packets are done.
In this section, we present the Kuder Richardson based mechanism for isolating root node attack that comprises the rendezvous point of the multicast tree with the aid of AODV, in an ad hoc network. This is accomplished through the computation of the Kuder – Richardson Reputation Co-efficient (KRRC). In this mechanism , each and every mobile nodes are monitored through the help of their neighbor to detect whether they exhibit root node attack or not The node is identified as root node attack compromised when the KRRC value is below 0.3 or else the node(RN) is confirmed as co-operative as presented in Figure 1. Experimental analyses for evaluating the performance of RFBMM based on the different packet drop rate are as follows:
5. Simulations and Experimental Analysis
The performance of KRRCM is thoroughly investigated through simulation using network simulator ns-2.26. The proposed simulation environment consists of 50 mobile nodes that randomly move in the terrain size of 1000x1000. Further, the channel capacity, refresh interval time and simulation time for the implemented algorithms is considered as 2 Mbps, 20 seconds and 150 seconds respectively. Furthermore, each source is considered to transmit packets with a constant bit rate of 30 packets/sec.
5.1. Performance Metrics
In group communication, the dissemination of data between the source and destination depends upon the group leader of the multicast tree. Further, the reliability in packet transfer gets affected when a node gets compromised through root node attacked. Furthermore, root node attack in an ad hoc scenario decreases the packet delivery ratio and throughput, while at the same instant increases the number of retransmissions. Finally, the performance of this mitigation algorithm is evaluated based on:
Packet Delivery Ratio: Packet delivery ratio is defined as the ratio of data packets received by the mobile node in the destinations to those generated by the sources.
Throughput: It is defined as the total number of packets delivered over the total simulation time.
Total Overhead: It is the ratio of total number of packets necessary for connection establishment and data delivery to the number of data packets that reaches the destination.
Control overhead: It is the maximum number of bytes of packets that are used for establishing communication between the source nodes and the destination nodes.
Table 1 illustrates the simulation parameters that are set for our study.
Parameter | Value | Description |
No.of mobile nodes | 50 | Simulation Node |
Type of Protocol | MAODV | Multicast ad hoc On-demand Distance Vector Protocol |
Type of Traffic | 40 packets per Second | Constant bit rate |
Type of Propagation | Two Ray Ground | Radio propagation model |
Simulation Time | 50m | Maximum simulation time. |
Number of packets used | 1000 | Maximum number of packets used in simulation. |
Channel capacity | 2 Mbps | Capacity of the wireless channel |
5.2. Performance Analysis for KRRCM
The performance of KRRCM is investigated through three experiments viz.,
a) Experiment 1: Based on varying number of mobile nodes with root node attackers as 10.
b) Experiment 2: Based on varying number of mobile nodes with root node attackers as 20.
c) Experiment 3: Based on varying number of root node attackers.
In all the three experiments, the network related parameters are considered to be the same for simulation.
5.2.1. Experiment 1: Based on Varying Number of Mobile Nodes with Root Node Attackers as 10
Figure. 2 demonstrates the superior performance of KRRCM compared to mechanisms like CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK with regard to packet delivery ratio. Our proposed mechanism, KRRCM shows a phenomenal increase in packet delivery ratio when compared to MAODV WITH CONFIDANT from 10% to 17% and from 23% to 31% over MAODV WITH ATTACK. This increase in packet delivery ratio is due to the rapid isolation rate of 34% in mitigating root node attackers.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the packet delivery rate in an average of 16%.
Figure. 3 demonstrates the superior performance of KRRCM compared to mechanisms like CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK with respect to throughput. Our proposed mechanism, KRRCM shows a phenomenal increase in throughput when compared to MAODV WITH CONFIDANT from 10% to 19% and from 20% to 28% over MAODV WITH ATTACK. This increase in throughput is mainly due to the efficient and effective isolation of root node attackers that drops packets.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the throughput in an average of 12%.
Figure. 4 presents the comparative analysis of KRRCM with CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK with respect to total overhead. Our proposed mechanism, KRRCM shows an optimal decrease of total overhead than CONFIDANT from 21% to 29% and from 26% to 33% over MAODV WITHATTACK.
Hence, it is obvious that KRRCM is an effective approach greatly reduces the number of retransmissions in an average of 21%.
Figure. 5 presents performance of KRRCM with CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK based on control overhead. The proposed KRRCM shows a phenomenal decrease of control overhead than CONFIDANT from 13% to 23% and from 16% to 27% over MAODV WITHATTACK.
Hence, it is obvious that KRRCM is an effective approach for mitigating the root node attack by reducing control overhead by an average of 14%.
5.2.2. Experiment 1: Based on Varying Number of Mobile Nodes with Root Node Attackers as 20
Figure. 6 demonstrates the superior performance of KRRCM compared to mechanisms like CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK with regard to packet delivery ratio. Our proposed mechanism, KRRCM shows a phenomenal increase in packet delivery ratio when compared to MAODV WITH CONFIDANT from 15% to 21% and from 25% to 29% over MAODV WITH ATTACK. This increase in packet delivery ratio is due to the rapid isolation rate of 34% in mitigating root node attackers.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the packet delivery rate in an average of 14%.
Figure. 7 demonstrates the superior performance of KRRCM compared to mechanisms like CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK with respect to throughput. Our proposed mechanism, KRRCM shows a phenomenal increase in throughput when compared to MAODV WITH CONFIDANT from 12% to 17% and from 17% to 23% over MAODV WITH ATTACK. This increase in throughput is mainly due to the efficient and effective isolation of root node attackers that drops packets.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the throughput in an average of 10%.
Figure. 8 presents the comparative analysis of KRRCM with CONFIDANT,MAODV WITH ATTACK and MAODV WITHOUT ATTACK with respect to total overhead. Our proposed mechanism, KRRCM shows an optimal decrease of total overhead than CONFIDANT from 16% to 24% and from 23% to 29% over MAODV WITH ATTACK.
Hence, it is obvious that KRRCM is an effective approach greatly reduces the number of retransmissions in an average of 18%.
Figure. 9 presents performance of KRRCM with CONFIDANT, MAODV WITH ATTACK and MAODV WITHOUT ATTACK based on control overhead. The proposed KRRCM shows a phenomenal decrease of control overhead than CONFIDANT from 11% to 20% and from 18% to 25% over MAODV WITHATTACK.
Hence, it is obvious that KRRCM is an effective approach for mitigating the root node attack by reducing control overhead by an average of 12%.
5.2.3. Experiment 3: Based on Varying Number of Root Node Attackers
Figure. 10 demonstrate the superior performance of KRRCM compared to the mechanism CONFIDANT with regard to packet delivery ratio. Our proposed mechanism, KRRCM shows a phenomenal increase in packet delivery ratio when compared to CONFIDANT from 14% to 19%.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the packet delivery rate in an average of 13%.
Figure. 11 demonstrates the superior performance of KRRCM compared to the mechanism CONFIDANT with respect to throughput. Our proposed mechanism, KRRCM shows a phenomenal increase in throughput when compared to CONFIDANT from 16% to 22%.This increase in throughput is mainly due to the efficient and effective isolation of root node attackers that drops packets.
Hence, it is evident that KRRCM effectively isolates root node attacker nodes that hinders reliable communication and increases the throughput in an average of 17%.
Figure.12 presents the comparative analysis of KRRCM with CONFIDANT with respect to total overhead. Our proposed mechanism, KRRCM shows an optimal decrease of total overhead than CONFIDANT from 26% to 33%.
Hence, it is obvious that KRRCM is an effective approach greatly reduces the number of retransmissions in an average of 16%.
Figure. 13 presents performance of KRRCM with CONFIDANT, based on control overhead. The proposed KRRCM shows a phenomenal decrease of control overhead than CONFIDANT from 6% to 27% over MAODV WITHATTACK.
Hence, it is obvious that KRRCM is an effective approach for mitigating the root node attack by reducing control overhead by an average of 19%.
6. Conclusion
This paper has presented a Kuder – Richardson Reputation Co-efficient based Cooperation Enforcement Mechanism (KRRCM) for isolating Root node attack through the identification of the reputation level of mobile node based on Kuder Richardson Reputation Coefficient. The simulation results of KRRCM isolates root node attackers with a successful rate of 34% and further improves the performance of the network with respect tot Packet delivery ratio, Throughput, Control overhead and Total overhead than the existing CONFIDANT mechanism. As the part of our future work, there is a innovative plan to elect a group leader based on average length metric for choose the core leader.
References