Académique Documents
Professionnel Documents
Culture Documents
Objective
To discover the one-hop neighbors of every node present in the network. To compute the trust level of the discovered neighbors in order to identify the malicious nodes.
Abstract
MANETs
self configuring autonomous networks do not require any central authority
Project Overview
Neighbor discovery using Directional Antenna
Methodology
A centralized Agent will calculate the trust level of every other node in the network Trust computing node will monitor the desired nodes behavior
Drawback
If the agent is compromised then entire system will be collapsed Cannot overcome attacks Selective misbehavior on-off attack
Obtains recommendation Cannot overcome attacks from the neighboring nodes false recommendation about a particular desired bad mouthing attack node
Proposed System
Neighbor Discovery
Completely randomized Scan Based Algorithm using directional antenna model.
Trust
Distributed hybrid trust computation using Artificial Neural network.
Neighbor Discovery
Feeding the information about new node to neural networks for trust computation
NND is important for Route discovery Geographic routing Localization Location specific services Data gathering in sensor networks Danger warning or traffic monitoring in VANETs. Neighbors can be of two types: Communication Neighbors Physical neighbors
Algorithm used
Completely Randomized Scan Based Neighbor Discovery Uses Directional Antenna. Direct discovery of neighbors
Methodology
Completely randomized Scan based Algorithm Nodes broadcast discover message to advertise itself. Time frame is divided into 2 slots. Discover message format is (Hello, IDA) ACK message format is (confirm, IDB) State of a node Transmit/Listen/Sleep
Algorithm Description
Scan Based Algorithm Divides the time frame into 2 mini-slots
Discover Message
Node-1 Transmits Discover Message
Node 1 Transmit mode 1 Discover 4 2 5 7 Discover 3 6
Discover
Confirm Message
Node-1s one hop neighbor send the confirm message to Node-1
Node 1 Listen mode 1 confirm 2 5 confirm 4 7 confirm 3 6
Packet Analyzing
Packet Analyzer
Monitors the nodes individually. Following information are collected Number of packets generated Number of Packets received Packet Forwarding Ration Packet modification information.
Sample File
Total Generated Packets = 202 Total Received Packets = 201 Total forwarded Packets = 0 Total dropped Packets = 1 Packet Modified=0 Packet Delivery Ratio =0.99505
Importance of trust
To work cooperatively. To avoid selfish and malicious node. To exchange the confidential information with the neighbors.
Recommendati ons
Neural Network Based Approach for direct trust prediction. Weights are assigned based on the neighbors trust value.
Trust Record
Each node maintains a trust record that contains the list of neighbors and their trust level.
Methodology
performs network monitoring Collects the trace file generated by monitoring the network. Uses the Packet Delivery Ratio, No of Packets generated, No of packets forwarded information to calculate the trust value of a node directly.
Contd..
Neural Network Based Approach
Uses Back Propagation Algorithm. Trains the network with the data collected by monitoring the network. Uses Supervised learning algorithm. The parameters to train the BPN
Packet forwarding ratio No of Packets generated per unit time.
The network is trained until the error converges to 10-6 The training algorithm used is traingd. Once the network is trained it can be used to predict the trust level of the node.
Received from one hop neighbors only. Sends RReq message to receive the recommendations. Weights are assigned to the recommendations based on nodes trust value. Weight matrix is used to assign the weights
Trust Aggregation
Recommendations from all the neighbors are aggregated by applying the weights. Trust computation formula TA (B)=QA (B)+ i=1 ,2,3..n Ri (B)
High
Average Average Poor Poor
0.8
0.6 0.5 0.2 0.0
Node ID 1 2 3
Advantages
Advantages of Proposed trust model are
Overcomes the Selective misbehavior attack and bad mouthing attack. Avoids network congestion. Diminishes the influence of the malicious nodes by providing variable weights to the recommendation. Reduces the false recommendations or recommendation modification.
Neighbor Table
--------Neighbors Table of Node0-------Node Neighbor 0 1 0 3 Total Number of Neighbors of Node0 = 2 --------Neighbors Table of Node1-------Node Neighbor 1 0 1 3 Total Number of Neighbors of Node1 = 2 --------Neighbors Table of Node3-------Node Neighbor 3 0 3 1 Total Number of Neighbors of Node3 = 2 --------Neighbors Table of Node4-------Node Neighbor Total Number of Neighbors of Node4 = 0
Snapshot- NN Training
After Training
Recommendation Table
References
Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, Fellow, IEEE, and Don Towsley, Fellow, IEEE, ACM , Efficient Algorithms for Neighbor Discovery in Wireless Networks. Sudarsan Vasudevan, Jim Kurose, Don Towsley, On Neighbor Discovery in Wireless Networks with Directional Antennas, UMass Computer Science Technical Report 04-53 ECC-0313747001. Zhensheng Zhang and Bo Li, Neighbor Discovery in Mobile Ad Hoc Self-Configuring Networks with Directional Antennas: Algorithms and Comparisons
References
Kannan Govindan, Member IEEE and Prasant Mohapatra, Fellow IEEE, Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto Carlos M. B. Duarte, and Guy Pujolle, Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based model, IEEE Transactions on Network and Service Management, vol. 7, no. 3, September 2010. Yan Sun, Wei Yu, Zhu Han, and K. J. Ray Liu, Trust Modeling and Evaluation in Ad Hoc Networks , Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20740. Asad Amir Pirzada and Chris McDonald, Establishing Trust In Pure Ad-hoc Networks , School of Computer Science & Software Engineering, The University of Western Australia Copyright (c) 2004, Australian Computer Society, Inc. This paper appeared at the 27th Australasian Computer Science Conference
List of Publications
Journal
Published a paper, titled Neighbor Discovery and Trust Prediction in MANETs in International Journal for Science, Engineering and Technology Research, Volume 2 Issue 1 on January 2013.
Conferences
Presented a paper titled DISTRIBUTED HYBRID TRUST
Paper titled AN INTEGRATED DIRECTIONAL ANTENNA MODEL FOR NEIGHBOR DISCOVERY AND TRUST PREDICTION IN MANETs
at International Conference On Computing , communication And Advanced Network, On l5 - l7 MARCH 20l3 at Chennai Institute of Technology.
THANK YOU