Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs

Bo Yang, Ryo Yamamoto, Yoshiaki Tanaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

The MANETs have been experiencing exponential growth in the past decade. However, their vulnerability to various attacks makes the security problem extremely prominent. The main reasons are its distributed, self-organized and infrastructure independent natures. As concerning these problems, trust management scheme is a common way to detect and isolate the compromised nodes when a cryptography mechanism shows a failure facing inner attacks. Among huge numbers of attacks, black hole attack may collapse the network by depriving the route of the normal communication. The conventional proposed method achieved good performance facing black hole attack, while failing to detect gray hole attacks. In this paper, a Dempster-Shafer (D-S) evidence based trust management strategy is proposed to conquer not only cooperative black hole attack but also gray hole attack. In the proposed method, a neighbour observing model based on watchdog mechanism is used to detect single black hole attack by focusing on the direct trust value (DTV). Historical evidence is also taken into consideration to go against gray hole attacks. Then, a neighbour recommendation model companied with indirect trust value (ITV) is used to figure out the cooperative black hole attack. D-S evidence theory is implemented to combine ITVs from different neighbours. Some of the neighbour nodes may declare a false ITV, which effect can also be diminished through the proposed method. The simulation is firstly conducted in the Matlab to evaluate the performance of the algorithm. Then the security routing protocol is implemented in the GloMoSim to evaluate the effectiveness of the strategy. Both of them show good results and demonstrate the advantages of proposed method by punishing malicious actions to prevent the camouflage and deception in the attacks.

Original languageEnglish
Title of host publication16th International Conference on Advanced Communication Technology
Subtitle of host publicationContent Centric Network Innovation!, ICACT 2014 - Proceeding
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages223-232
Number of pages10
ISBN (Print)9788996865032
DOIs
Publication statusPublished - 2014 Jan 1
Event16th International Conference on Advanced Communication Technology: Content Centric Network Innovation!, ICACT 2014 - PyeongChang, Korea, Republic of
Duration: 2014 Feb 162014 Feb 19

Publication series

NameInternational Conference on Advanced Communication Technology, ICACT
ISSN (Print)1738-9445

Conference

Conference16th International Conference on Advanced Communication Technology: Content Centric Network Innovation!, ICACT 2014
Country/TerritoryKorea, Republic of
CityPyeongChang
Period14/2/1614/2/19

Keywords

  • Black hole attack
  • Dempster-Shafer evidence
  • Direct trust value
  • Gray hole attack
  • Indirect trust value
  • MANETs
  • Trust management

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs'. Together they form a unique fingerprint.

Cite this