Swarm based Energy Aware Mitigation Mechanism for Root Node

Recent Advances In Telecommunications, Informatics And Educational Technologies
Swarm based Energy Aware Mitigation Mechanism for Root Node
Attacks in MANETs
S.PARTHIBAN, 2PAUL RODRIGUES
Department of Computer Science Engineering
Anna University, Chennai
INDIA
1
[email protected], [email protected]
1
Abstract: - In Mobile ad hoc networks, the reliability in packet delivery during group communication highly
depends on the collaboration of intermediate nodes existing between the source and destination. Further, the
Rendezvous point node acts as the group leader for forwarding packets between in each and every multicast
group. Furthermore, the root node attack in multicasting may crumble the performance of the entire network.
Hence, the necessity for detecting and mitigating Rendezvous point is considered as one of the significant
research issue to be resolved. In this paper, we propose a Swarm based Energy Aware Mitigation Mechanism
(SEAMM) for mitigating rendezvous point attack based on Optimal Energy Factor (OEF) and swarm
intelligence. The performance of SEAMM is analyzed using ns-2 simulation and the proposed energy based
detection approach outsmarts the CONFIDANT protocol with an improvement in packet delivery rate and
throughput of 34% and 29% respectively.
Key-Words: -Rendezvous point attack, MAODV, Optimal energy factor, Mobility factor, Mobility Proportion,
Expected energy.
1 Introduction
Although, researchers have put forward large
number of techniques, to detect and mitigate various
types of malicious attacks in MANETs, most of the
proposed approaches were mainly framed for
unicast routing activity. The influence of malicious
attacks on the multicast application has not been
explored in the literature. This paper focuses on
detecting and mitigating malicious nodes in a
multicast routing activity by making use of
MAODV protocol. The MAODV protocol is a tree
based protocol, in which the data dissemination
from source group to destination group is done
through the rendezvous point present in each
multicast group. In this paper, we propose a Swarm
based Energy Aware Mitigation Mechanism
(SEAMM) for mitigating rendezvous point attack
based on Optimal Energy Factor and swarm. The
proposed approach SEAMM quantifies the trust of
the group leader is estimated through the Optimal
Energy Factor computed based on Observed Energy
and Expected Energy identified for a root node.
Further, new group leader that replaces the existing
group leader is elected based on constant mobility
factor.
Mobile ad hoc network is defined as a collection of
autonomous mobile nodes that performs the act of
routing without relying on any centralized
infrastructure. In this network, nodes are free to
move in an arbitrary fashion and hence the topology
of the network is highly dynamic in nature [1]. In
the dynamic topology, the mobile nodes present in a
particular range can communicate directly, whereas
the nodes present outside the communication range
make use of intermediate nodes to transfer a data
packet to its destiny and this type of transmission
may be called as multi-hop routing. In this multihop routing, the probability of a node participating
in a routing activity is highly dependent on the
reputation factor of the node [3]. The reputation
factor of a mobile node reflects the reliability and
cooperatively of the particular mobile node to
participate in a routing activity. But, there are some
classes of mobile nodes which do not actively
participate in the routing activity and drops many
packets without transmitting to the next intermediate
or to the destiny node. In general, such classes of
nodes are known as malicious nodes, which by its
activity drastically reduce the network performance.
ISBN: 978-1-61804-262-0
The remaining part of the paper is organized as
follows. Section 2 presents a brief literature review
199
Recent Advances In Telecommunications, Informatics And Educational Technologies
on the existing mitigation mechanism proposed for
detecting rendezvous point attack. Section 3 and 4
elaborates on the proposed SEAMM mechanism
with its associated algorithms. Section 5 presents the
simulation setup used for the implementation of
SEAMM and the comparative study carried out with
CONFIDANT. Section 6 concludes the paper with
future plan of research.
the network by utilizing a bootstrap router that
enables efficient routing. This mechanism is based
on the principle of tit for tat strategy where
malicious nodes are punished with -1 and the
normal routing nodes are rewarded with +1.
Depending upon the number of punishments and
rewards gained by a mobile node, the decision of
isolating malicious nodes were taken into account.
C. Demir and C.Comaniciu et al.,[9] proposed a
2 Related Work
novel detection mechanism based on the
concept of auction. This mechanism selects the
optimal routing path by computing the
minimum cost obtained by the mobile nodes in
each and every individual bids. This mechanism
further manipulates the optimal routing path
based on the payment which is equal to the
magnitude of second lower valued bid.
From the past decade, a number of mitigation
mechanisms have been proposed for rendezvous
point attack which is considered to be the crucial
malicious activity that could degrade the
performance of the network during multicasting.
Some of the mitigation approaches available in the
literature for detecting rendezvous point attack are
enumerated below.
In addition, H. Yang et al.,[10] contributed a
detection mechanism that utilizes one way hash
function for predicting the gentility parameter
of a mobile node. The utilized hash function
depends on the second hand information
obtained from the neighbour nodes of the
shared multicast group leader. They also
contributed a fault tolerance mechanism that
aids in enhancing delivery of data packets. An
evidence based trust aided mitigation
mechanism was proposed by Thomas M.Chen
et al., [11] which identifies the attacker nodes
based on the rule of Dempster-Shafer Theory.
This approach also computes the trust factor
based on second hand information using the
concept of posterior probability.
Kumar Das et al.,[4]contributed a reactive multicast
protocol that enables reliable transmission of data
by organizing nodes into shared multicasting
determined based on node behaviour. The authors
investigated the issue of multicasting based on link
stability, energy efficiency and expiration time.
They also developed a framework for efficient
detection of malicious activity that could decrease
the network survivability. L. Buttyan and J.P
Hubaux[5] contributed a trust oriented framework
that enforces cooperation between mobile nodes of
an ad hoc environment. They implemented a tamper
resistance module for detecting and mitigating
rendezvous point attack. They also prove that
malicious activity can be identified efficiently based
on path rater and watch dog mechanism.
Further, S.Roy et al., [6] contributed a mitigation
mechanism that could deal with the exhaustive sets
of attacks that could originate in a multicasting
environment.
This
mitigation
mechanism
investigates wide range of issues that could arise
during route establishment and route maintenance
by incorporating control packets like RREP-INV,
MACT (P), MACT (J) and MACT (J)-MTF.Bing
Wu et al., [7] proposed a Watchdog and Path Rater
dependent intrusion detection system that monitors
the trustworthiness of the mobile nodes participating
in group communication. Watch dog and Path Rater
were utilized for computing reputation of the mobile
nodes through which the decision of identification
may be incorporated.
2.1 Extract of the Literature
From the review of the literature from the research
works available for mitigating rendezvous point
attack, the following shortcomings were identified:
•
•
Furthermore, Chi-Yang Chang et al., [8] innovated a
mechanism for recovering compromised nodes of
ISBN: 978-1-61804-262-0
200
A swarm intelligence based mitigation
mechanism for root node attack based on energy
availability has not been proposed to the best of
my knowledge.
A distributed mitigation mechanism that detects
a group leader as compromised and elects a new
group leader based on mobility proportion has
not been much explored.
Recent Advances In Telecommunications, Informatics And Educational Technologies
These limitations of the literature are the motivation
factors for proposing Swarm based Energy Aware
Mitigation Mechanism for mitigating rendezvous
point attack based on Optimal Energy Factor and
swarm intelligence.
root node.
Then, Observed Energy
computed through (1)
(1)
2.1.1 Sub-subsection
When including a sub-subsection you must use, for
its heading, small letters, 11pt, left justified, bold,
Times New Roman as here.
The Expected Energy
computed through (2)
of a root node is
(2)
3 Swarm based Energy Aware
Mitigation Mechanism (SEAMM)
Then, Optimal Energy Factor
using (3)
is computed
(3)
In group communication, when a source node wants
to transfer data packets to the destination node
present in another group, the routing path from one
group to another group is identified based on the
group leader. In MAODV protocol which is a tree
based protocol, the group leader is a root node
present in the tree structure. When a root node or
group leader is comprised to perform malicious
activities like forwarding malicious node’s packets,
being idle without participating in the normal
routing activity, then such type of attack is termed
as root node attack.
If the obtained value of
is very less i.e., value
near to 0, shows that the root node does not
participate in any routing activity and also it shows
that the root node is compromised to the malicious
behaviour. Isolation process of the non-cooperative
root node is done and new group leader is selected
using the information obtained through swarm based
routing.
The election process of group leader through swarm
based routing is based on the following steps:
The proposed SEAMM approach detects the
presence of root node attack based on the
. This
computation of Optimal Energy Factor
factor quantifies the energy level of the root nodes
participating in a group communication by
considering the two parameters into account viz.,
1) The Observed Energy
of root node is
defined as the amount of energy utilized by a
mobile root node while participating in the
routing activity.
a) When a Source node in a multicast group wants
to communicate with a destination node of
another multicast group, it sends the RREQ tothe
Group leader (G1) of the sender at some level T1.
b) The Group leader (G1) at T1 initially searches the
local cache update which stores the energy level
of G1,for the matching process to compare the
energy level with all the downstream nodes.
c) If a downstream node of G1 contains energy
more than G1and further greater than half of the
energy available with the other downstream
nodes.
d) Then, GLEC triggers thedownstream node of G1
to be elected as the new G1by sending GRPH and
MACT packets all the other downstream and
upstream nodes.
e) On receiving the MACT packet, the Group leader
node G2will check their MACT_Table.
f) SR collects all the matching entries fromthe
MACT packets send by the Group leader node
G2.
g) Further, if a downstream node of G1 does not
contain energy more than G1and not greater than
half of the energy available with the other
downstream nodes
2) The Expected Energy
of a root node is
defined as the ratio of currents available in the
root node to the minimum energy required for
forwarding packets.
The Observed Energy
is computed based on
initial energy
energy utilization as follows. Let
possessed by the root node before the
be the currently
commencement of data transfer,
available energy of a root node,
be the energy
required for a root node to transfer a single data
packet and
be the number of packets present in
the root node buffer to be transferred to the another
ISBN: 978-1-61804-262-0
is
201
Recent Advances In Telecommunications, Informatics And Educational Technologies
h) GLEC selects a node with has a constant mobility
factor measured based on signal to noise ratio,
determined through bit error ratio (BER) given by
(4)
8. Else
9. Normal routing
10. End
When the source node wants to send some data to a
destination using MAODV protocol, the source
performs the route discovery process by flooding
RREQ packets to all the possible paths destined to
the destination through the forward route and
establishes an efficient route to the destination after
the acknowledgement of RREP packets. Further, the
source node present in one of the multicast group
relies on the group leader of that particular group
and the group leader of the other multicast groups
participating in the group communication. This
reliability of the group leader is estimated through
the Optimal Energy Factor computed (OEF) based
on Observed Energy for a root node and Expected
Energy for a root node obtained through step (3) and
(4) of algorithm1.If the Optimal Energy Factor
of a rendezvous point of a multicast group is
found to be less than 0.1 and converging to 0, then
the rendezvous point node is identified as
compromised and the new group leader is elected
using algorithm 2 using mobility factor, dynamic
distance between mobile nodes and mobility
Proportion
(4)
Where‘d’ is defined as the average of the dynamic
distance between two mobile nodes and ‘k’ is the
mobility proportion.
In ideal condition, i.e., when movement is almost
then,
constant,
(5)
4 Algorithm for Swarm based Energy
Aware Mitigation Mechanism
The algorithm for Swarm based Energy Aware
Mitigation Mechanism can be explained into two
phases, viz.,
a) Algorithm for the Computation of Optimal
Energy Factor
b) Algorithm for electing New Group Leader
4.1 Algorithm for the Computation of
Optimal Energy Factor
4.2 Algorithm for electing New Group
Leader
Notations
- Optimal Energy Factor
- Observed Energy
-Expected Energy
- Initial energy possessed by the root node before
the commencement of data transfer
- Currently available energy of a root node
- Energy required for a root node to transfer a
single data packet
- Number of packets present in the root node
buffer to be transferred to the another root node
Notations
SR – Source Node
-mobility factor
D-average of the dynamic distance between two
mobile nodes
k-Mobility Proportion
1. Begin
2. Send RREQ to the Group Leader
of the
sender at the level
3. for the entire network of downstream nodes
of
do
4. Compare energy level of with all other
downstream nodes, if
5. Then, Elect downstream of
as new group
leader
1. Begin
2. for the entire network do
3. Compute Observed Energy for a root node using
4. Compute Expected Energy
computed through
5. Using
Factor
and
of a root node is
5.1 Begin
5.2 For the entire downstream and upstream
nodes
5.3 Send GRPH and MACT Packets
5.4 End
, Compute Optimal Energy
through
, then
6. If
7. Call Elect Group Leader ()
ISBN: 978-1-61804-262-0
202
Recent Advances In Telecommunications, Informatics And Educational Technologies
Table 1: Simulation Setup
6. Update the MACT_TABLE of group leader
7.
sends MACT packets to SR
8. Else
8.1 Begin
8.2. Elect new group leader
based on
constant mobility factor computer
through
8.3 End
9. End
Algorithm 2 elects the new group leader by
comparing the energy level of group leader with
all other downstream nodes of that multicast tree,
and elects a new group leader
i.e,
and this group leader announces its succession to all
the downstream and upstream nodes of that
multicast group.But, when energy level of group
is greater than the other downstream
leader
nodes, i.e,
. Then, the new group
leader is elected based on constant mobility factor
manipulated through step (9) of algorithm 2.
5. Simulations and Experimental
Analysis
The comparative analysis of SEAMM with the
CONFIDANT protocol is exhaustively carried out
through simulation using network simulator of
version ns-2.26. Further, the proposed topology for
simulation contains 100 mobile nodes that
arbitrarily move around a terrain size of 1000x1000
with a constant bit rate of 60 packets/sec, channel
capacity of 2 Mbps, refresh interval time of 20
seconds and simulation time of 150 seconds
.Further, the SEAMM and CONFIDANT algorithms
are implemented with the same simulation setup
parameters and their performances are evaluated
based on packet delivery ratio, throughput, total
overhead and control overhead since ,the reliable
dissemination of data between the source and
destination depend mainly on the group leader of the
shared multicast tree. Furthermore, the rendezvous
point attack drastically reduces the packet delivery
rate and throughput which in turn increases the
number of retransmissions.
Parameter
Value
Description
No. of mobile
nodes
100
Simulation
Node
Type of
Protocol
MAODV
Multicast ad
hoc On
demand
Distance
Vector
Protocol
Type of
Traffic
40 packets per
Second
Constant bit
rate
Type of
Propagation
Two Ray
Ground
Radio
propagation
model
Simulation
Time
50m
Maximum
simulation
time.
Number of
packets used
1000
Maximum
number of
packets used
in simulation.
Channel
capacity
2 Mbps
Capacity of
the wireless
channel
5.1 Performance analysis for SEAMM
The performance of SEAMM is exhaustively
studied based on three experiments viz.
a) Experiment 1: Varying the number of mobile
nodes with number of root node attackers (s=5).
b) Experiment 2: Varying number of mobile nodes
with number of root node attackers (s=10).
c) Experiment 3: Varying the number of root node
attackers in increments of 10.
The following section enumerates on the
performance of the SEAMM when compared to
CONFIDANT protocol:
5.1.1
Experiment 1: Varying the number of mobile
nodes with number of root node attackers
Fig. 2 depicts the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
ISBN: 978-1-61804-262-0
203
Recent Advances In Telecommunications, Informatics And Educational Technologies
MAODV WITHOUT ATTACK with respect to
packet delivery ratio. Our proposed SEAMM
approach exhibits an improved performance in
packet delivery ratio from 17% to 21% and from
24% to 29% when compared to the benchmark
schemes like CONFIDANT and MAODV WITH
ATTACK. This improvement in the packet delivery
rate is achieved since SEAMM detects and mitigates
rendezvous point attack at a faster rate of 38%.
It is also obvious that our SEAMM approach
mitigates root node compromised nodes rapidly and
increases the throughput by reducing packet drops
in an average of 18%.
Fig. 4 portrays the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK based on total
overhead. Our proposed approach SEAMM exhibits
an optimal performance by reducing the total
overhead from 23% to 26% and from 29% to 39%
over CONFIDANT and MAODV WITH ATTACK.
90
85
Packet Delivery Ratio
80
75
70
16
MAODV
MAODV
MAODV
MAODV
65
15
60
50
10
MAODV
MAODV
MAODV
MAODV
15
14
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
20
25
30
35
No.of Mobile Nodes
40
45
Total Overhead
55
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
50
13
12
11
Fig. 2: Experiment 1-Performance Chart for SEAMM
based on Packet Delivery Ratio
10
10
It is also evident that SEAMM mitigates root node
attack at faster rate and improves the packet delivery
rate in an average of about 23%.
15
20
25
30
35
No.of Mobile Nodes
40
45
50
Fig. 4: Experiment 1-Performance Chart for SEAMM
based on Total Overhead
It is also proved that, SEAMM is identified as an
effective and efficient approach that minimizes the
total overhead by reducing the number of
retransmissions in an average of 24%.
Fig. 3 represents the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK based on
throughput. Our proposed SEAMM mitigation
approach demonstrates a phenomenal improvement
in throughput in par with the existing approaches
like CONFIDANT from 16% to 29% and from 23%
to 33% over MAODV WITH ATTACK. This
improvement in throughput is due to the efficient
energy mechanism incorporated for detecting root
node attackers that maliciously drops packets.
Fig. 5 represents the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK with respect to
control overhead. Furthur, the proposed swarm
based SEAMM approach gradually reduces the
control overhead from 21% to 16% and from 18%
to 15% than CONFIDANT and MAODV WITH
ATTACK.
85
4
80
1.5
x 10
1.4
70
65
60
10
MAODV
MAODV
MAODV
MAODV
15
Control Overhead
Throughput
1.45
75
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
20
25
30
35
No.of Mobile Nodes
MAODV
MAODV
MAODV
MAODV
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
1.35
1.3
1.25
1.2
40
45
50
1.15
1.1
Fig. 3: Experiment 1-Performance Chart for SEAMM
based on Throughput
ISBN: 978-1-61804-262-0
1.05
10
204
15
20
25
30
35
No.of Mobile Nodes
40
45
50
Recent Advances In Telecommunications, Informatics And Educational Technologies
Fig. 5: Experiment 1- Performance Chart for SEAMM
based on Control Overhead
85
It is clear that our proposed SEAMM mitigates the
root node attackers based on swarm intelligence and
reduces the control overhead in an average of 19%.
Experiment 2: Varying number of mobile nodes
with number of root node attackers(s=10)
Fig. 6 depicts the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK with respect to
packet delivery ratio. Our proposed SEAMM
approach exhibits an improved performance in packet
delivery ratio from 13% to 16% and from 18% to
22% when compared to the benchmark schemes
like CONFIDANT and MAODV WITH ATTACK.
This improvement in the packet delivery rate is
achieved since SEAMM detects and mitigates
rendezvous point attack at a faster rate of 38%.
75
70
65
60
10
MAODV
MAODV
MAODV
MAODV
15
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
20
25
30
35
40
45
50
Fig. 7: Experiment 2-Performance Chart for SEAMM
based on Throughput
It is also obvious that our SEAMM approach
mitigates root node compromised nodes rapidly and
increases the throughput by reducing packet drops
in an average of 15%.
Fig. 8 portrays the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK based on total
overhead. Our proposed approach SEAMM exhibits
an optimal performance by reducing the total
overhead from 23% to 26% and from 29% to 39%
over CONFIDANT and MAODV WITH ATTACK.
90
85
80
Packet Delivery Ratio
Throughput
5.1.2
80
75
70
65
60
MAODV
MAODV
MAODV
MAODV
55
50
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
14
13.5
45
13
15
20
35
30
25
No.of Mobile Nodes
40
45
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
12.5
50
Total Overhead
40
10
MAODV
MAODV
MAODV
MAODV
Fig. 6: Experiment 1-Performance Chart for SEAMM
based on Packet Delivery Ratio
12
11.5
11
10.5
10
It is also evident that SEAMM mitigates root node
attack at faster rate and improves the packet delivery
rate in an average of about 16 %.
9.5
10
20
35
30
25
No.of Mobile Nodes
40
45
50
Fig. 8: Experiment 2-Performance Chart for SEAMM
based on Total Overhead
Fig. 7 represents the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK based on
throughput. Our proposed SEAMM mitigation
approach demonstrates a phenomenal improvement
in throughput in par with the existing approaches
like CONFIDANT from 11% to 18% and from 20%
to 26% over MAODV WITH ATTACK. This
improvement in throughput is due to the efficient
energy mechanism incorporated for detecting root
node attackers that maliciously drops packets.
ISBN: 978-1-61804-262-0
15
It is also proved that, SEAMM is identified as an
effective and efficient approach that minimizes the
total overhead by reducing the number of
retransmissions in an average of 24%.
Fig. 9 represents the performance of SEAMM over
CONFIDANT, MAODV WITH ATTACK and
MAODV WITHOUT ATTACK with respect to
control overhead. Further, the proposed swarm
based SEAMM approach gradually reduces the
control overhead from 21% to 16% and from 18%
205
Recent Advances In Telecommunications, Informatics And Educational Technologies
to 15% than CONFIDANT and MAODV WITH
ATTACK.
x 10
1.14
1.12
MAODV
MAODV
MAODV
MAODV
WITH ATTACK
WITH SEAMM
WITHOUT ATTACK
WITH CONFIDANT
65
Throughput
1.16
1.1
Control Overhead
MAODV WITH SEAMM
MAODV WITH CONFIDANT
70
4
1.08
60
55
1.06
50
1.04
1.02
45
1
40
10
0.98
0.96
10
15
20
25
30
35
No.of Mobile Nodes
40
45
Fig. 9: Experiment 2- Performance Chart for SEAMM
based on Control Overhead
25
30
35
40
45
50
Fig. 12 depicts the performance of SEAMM over
CONFIDANT based on total overhead. The
proposed SEAMM approach exhibits a phenomenal
decrease in total overhead of about 23% to 31%
than CONFIDANT.
Experiment 3: Based on varying number
of root node attackers.
The performance of SEAMM is compared with the
existing reputation approach named CONFIDANT
based on packet delivery ratio is presented in fig.
10. Our proposed SEAMM approach exhibits a
phenomenal improvement in packet delivery ratio
than CONFIDANT from 14% to 19%.
12.5
12
Total Overhead
85
20
It is also clear that SEAM effectively and efficiently
detects root attacker nodes and mitigates them at
faster rate of 34% and further increases the
throughput to a maximum extent of 17%.
It is clear that our proposed SEAMM mitigates the
root node attackers based on swarm intelligence and
reduces the control overhead in an average of 16%.
5.1.3
15
Fig.11: Experiment 3- Performance Chart for SEAMM
based on Throughput
50
MAODV WITH SEAMM
MAODV WITH CONFIDANT
80
11.5
Packet Delivery Ratio
11
75
10.5
70
MAODV WITH SEAMM
MAODV WITH CONFIDANT
65
10
60
55
15
20
25
30
35
No.of Root Node Attackers
40
45
50
25
30
35
No.of Root Node Attackers
40
45
50
It is also clear that SEAM effectively and
efficiently detects root attacker nodes and mitigates
them at faster rate of 34% and further reduces the
total overhead to a maximum level of 23%.
Fig.10: Experiment 3- Performance Chart for SEAMM
based on packet delivery ratio
Further, it is also obvious that SEAMM increases
the packet delivery rate to a maximum extent of
21% than CONFIDANT.
The performance of SEAMM is compared with the
existing reputation approach named CONFIDANT
based on Throughput is presented in fig.11. Our
proposed SEAMM approach exhibits a phenomenal
improvement in throughput than CONFIDANT
from 24% to 29%.
ISBN: 978-1-61804-262-0
20
Fig.12: Experiment 3- Performance Chart for
SEAMM based on Total Overhead
50
10
15
206
Recent Advances In Telecommunications, Informatics And Educational Technologies
Fig. 13 depicts the performance of SEAMM over
CONFIDANT based on control overhead. The
proposed SEAMM approach exhibits a phenomenal
decrease in control overhead from 23% to19% than
CONFIDANT.
[3] Zouridaki,C, Mark,B.L, Hejmo,M and Thomas,R.K
(2005). ‘A quantitative trust establishment framework for
reliable data packet delivery in MANETs’, Proceedings of
the 3rd ACM Workshop on security of ad hoc and sensor
networks, vol 1, pp.1-10.
[4] Subir Kumar Das, B.S. Manoj, and C. Siva Ram
Murthy. Dynamic Core-Based Multicast Routing Protocol
for Ad Hoc Wireless Networks. In Proceedings of the
Third ACM International Symposium on Mobile Ad Hoc
Networking and Computing, pages 24–35, June 2002.pp
33-46
4
x 10
1.35
Control Overhead
1.3
1.25
[5] L.Buttyan and J-P, Hubaux, (2003), ‘Stimulating
Coperation in Self –organizing Mobile Ad hoc Networks”,
Mobile Computing and Networking’ pp 255-265.
1.2
1.15
10
[6] S. Roy, V.G. Addada, S. Setia and S.Jajodia, Securing
MAODV: Attacks and countermeasures, in Proceedings of.
SECON’05, IEEE, 2005.
MAODV WITH SEAMM
MAODV WITH CONFIDANT
1.1
15
20
35
30
25
No.of Root Node Attackers
40
45
50
[7] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei. A
Survey on Attacks and Counter measures in Mobile Ad
Hoc Networks. WIRELESS/MOBILE, NETWORK
SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.) 2006
Springer.
Figure 13: Experiment 3- Performance Chart for
SEAMM based on Control Overhead
It is also transparent that SEAM effectively and
efficiently detects root attacker nodes and mitigates
them at faster rate of 34% and further reduces the
control overhead to a maximum level of 16%.
[8] Chi-Yuan Chang, Yun-Sheng Yen. Chang-Wei Hsiesh
Han-Chieh Chao an Efficient Rendezvous Point Recovery
Mechanism in Multicasting Network, International
Conference on Communications and Mobile Computing,
2007.
6 Conclusion
[9] Demir, C and Comaniciu C. An Auction based AODV
Protocol for Mobile Ad Hoc Networks with Selfish Node.
Communications ICC'07. IEEE International Conference
in June 2007.
This paper has presented a Swarm based Energy
Aware Mitigation Mechanism (SEAMM) for
mitigating rendezvous point attack based on
Optimal Energy Factor (OEF) and swarm
intelligence. This mechanism identifies reliability of
the group leader through the Optimal Energy Factor
computed through Observed Energy and Expected
Energy possessed by the root node. The exhaustive
simulation study of SEAMM reveals that this
approach isolates rendezvous point attackers and
improves the performance of the network in terms
of Packet delivery ratio, Throughput, Control
overhead and Total overhead with a rapid detection
rate of 34% than the existing approaches of the
literature. As the part of our future plan, We have
proposed to elect the group leader based on link
stability metrics and link utility factor.
[10] H. Yang, H. Y. Luo, F. Ye, S. W. Lu, and L. Zhang,
Security in mobile ad hoc networks: Challenges and
solutions. IEEE Wireless Communications, vol. 11, pp. 3847, 2004.
11] Chen, T.M, Varatharajan,V (2005) Dempster-Shafer
Theory for Intrusion Detection in Ad Hoc Networks. IEEE
Internet Computing.pp 233-245.
References
[1] Rizvi,S and Elleithy,M,(2009) ‘A new scheme for
minimizing malicious behavior of mobile nodes in Mobile
Ad Hoc Networks’, IJCSIS Internation Journal of
computer Science and Information Security. Vol.3, No.1.
[2] Tarag Fahad and Robert Askwith., ‘A Node
Misbehaviour Detection Mechanism for Mobile Ad hoc
Networks’, PGNet. 2006.
ISBN: 978-1-61804-262-0
207