Title :
Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs
Author :
Bo Yang ; Yamamoto, Ryo ; Tanaka, Yuichi
Author_Institution :
Global Inf. & Telecommun. Inst., Waseda Univ., Tokyo, Japan
Abstract :
The MANETs have been experiencing exponential growth in the past decade. However, their vulnerability to various attacks makes the security problem extremely prominent. The main reasons are its distributed, self-organized and infrastructure independent natures. As concerning these problems, trust management scheme is a common way to detect and isolate the compromised nodes when a cryptography mechanism shows a failure facing inner attacks. Among huge numbers of attacks, black hole attack may collapse the network by depriving the route of the normal communication. The conventional proposed method achieved good performance facing black hole attack, while failing to detect gray hole attacks. In this paper, a Dempster-Shafer (D-S) evidence based trust management strategy is proposed to conquer not only cooperative black hole attack but also gray hole attack. In the proposed method, a neighbour observing model based on watchdog mechanism is used to detect single black hole attack by focusing on the direct trust value (DTV). Historical evidence is also taken into consideration to go against gray hole attacks. Then, a neighbour recommendation model companied with indirect trust value (ITV) is used to figure out the cooperative black hole attack. D-S evidence theory is implemented to combine ITVs from different neighbours. Some of the neighbour nodes may declare a false ITV, which effect can also be diminished through the proposed method. The simulation is firstly conducted in the Matlab to evaluate the performance of the algorithm. Then the security routing protocol is implemented in the GloMoSim to evaluate the effectiveness of the strategy. Both of them show good results and demonstrate the advantages of proposed method by punishing malicious actions to prevent the camouflage and deception in the attacks.
Keywords :
cryptography; inference mechanisms; mobile ad hoc networks; telecommunication network management; telecommunication security; Dempster-Shafer evidence theory; GloMoSim; MANET; Matlab; cooperative black hole attacks; cryptography mechanism; gray hole attacks; indirect trust value; neighbour observing model; trust management strategy; watchdog mechanism; Ad hoc networks; Digital TV; Educational institutions; Mobile computing; Routing protocols; Security; Black hole attack; Dempster-Shafer evidence; Direct trust value; Gray hole attack; Indirect trust value; MANETs; Trust management;
Conference_Titel :
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Conference_Location :
Pyeongchang
Print_ISBN :
978-89-968650-2-5
DOI :
10.1109/ICACT.2014.6779177