Mobile Ad-hoc Networks (MANETs) are decentralized wireless networks. The characteristics of MANETs are dynamic topology and a lack of fixed infrastructure. These features make them highly flexible and expose them to significant security vulnerabilities. To overcome these vulnerabilities,our energy composite trust model calculates a trust score for each node based on its packet forwarding behaviour and energy consumption. It also incorporates a direct mechanism for identifying flooding attacks by monitoring packet traffic rates. The proposed system was implemented and evaluated using the NS-3 simulator. Simulation results in NS-3 demonstrate that the proposed method effectively isolates malicious nodes.
Introduction
Mobile Ad-Hoc Networks (MANETs) are decentralized wireless networks with dynamic topology and no centralized control, making them vulnerable to attacks like packet dropping, resource depletion, and flooding-based Denial-of-Service (DoS). This paper proposes a trust-based intrusion detection system that enhances MANET security by monitoring three key trust metrics: forwarding behavior, energy consumption, and flooding attack detection.
Forwarding Trust measures the ratio of packets successfully forwarded versus dropped by a node.
Energy Trust monitors abnormal energy consumption, penalizing nodes that consume energy excessively, which may indicate malicious or selfish behavior.
Flooding Detection uses a threshold-based mechanism to identify nodes sending unusually high packet rates, signaling a flooding attack.
The system calculates a combined trust score (weighted 70% energy trust and 30% forwarding trust). Nodes falling below a trust threshold (0.7) are classified as malicious and isolated by disabling their network participation.
A simulation using 20 mobile nodes (with one malicious node exhibiting 70% packet dropping and flooding behavior) demonstrated that the trust model effectively identified and isolated the malicious node. The malicious node’s trust score declined steadily due to packet dropping, high energy consumption, and flooding, resulting in successful removal from the network. Normal nodes maintained consistently high trust scores.
Conclusion
This paper presented a trust model that uses forwarding behaviour and energy consumption for trust metrics and integrates a specific flood detection mechanism that decreases the malicious node\'s trust. The NS-3 simulation results confirmed that the system can successfully identify a node performing simultaneous packet dropping, energy drain, and flooding attacks, and isolate it from the network to protect other nodes.
References
[1] Govindan, K., & Mohapatra, P. (2011). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279-298.
[2] Ponnusamy, M., Senthilkumar, A., & Manikandan, R. (2021). Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turkish Journal of Computer and Mathematics Education, 12(9), 2404-2410.
[3] Sen, J. (2010, July). A distributed trust and reputation framework for mobile ad hoc networks. In International Conference on Network Security and Applications (pp. 538-547). Berlin, Heidelberg: Springer Berlin Heidelberg.
[4] Aravindh, S., Vinoth, R. S., & Vijayan, R. (2013). A trust based approach for detection and isolation of malicious nodes in manet. International Journal of Engineering and Technology (IJET), 5(1), 193-199.
[5] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265).
[6] Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications magazine, 40(10), 70-75.
[7] Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., &Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEe Access, 9, 120996-121005.
[8] Kukreja, D., Dhurandher, S. K., & Reddy, B. R. (2018). Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. Journal of Ambient Intelligence and Humanized Computing, 9(4), 941-956.
[9] Shan, A., Fan, X., Wu, C., Zhang, X., & Fan, S. (2021). Quantitative study on the impact of energy consumption based dynamic selfishness in MANETs. Sensors, 21(3), 716.
[10] Riley, G. F., & Henderson, T. R. (2010). The ns-3 network simulator. In Modeling and tools for network simulation (pp. 15-34). Berlin, Heidelberg: Springer Berlin Heidelberg.