SlideShare a Scribd company logo
1 of 23
Download to read offline
Performane Analysis Of The CONFIDANT
Protocol (Cooperation Of Nodes :Fairness In
Dynamic Ad-hoc Networks)
Hamza Hammami
12 décembre 2012
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Introduction
The Condant protocol works as an extension to a reactive
source routing protocol for mobile ad-hoc networks.
CONFIDANT aims at making misbehavior in mobile ad hoc
networks unattractive. It is based on selective altruism and
utilitarianism.
We present a performance analysis of DSR fortied by
CONFIDANT and compare it to regular defenseless DSR.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
The DSR Protocol
The DSR Protocol it is a protocol developed for routing in a
mobile ad-hoc networks.
After receiving routes, the source node selects the best, stores
it and sends messages along that path.
A link failure is detected by a node that cannot forward the
packet to the next node in the source route. It then sends a
ROUTE ERROR message to the source.
Packets are then forwarded along an alternate route that does
not contain the bad link.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Attacks against routing
The lack of infrastructure of mobile ad-hoc networks oer special
chance to attacks.We should provide a proper security to protect
against the following attacks :
No Forwarding(of control message of data).
Trac deviation(advertises manu excellent routes or advertises
routes very rapidly so they are deemend good routes).
Route salvaging.
Lack of error messages.
Unusually frequent route updates.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Thwarting Attack
The aim is prevention ,We should provide perfect mechanism.Most
attacks have been the result of by passing prevention mechanisms.
We propose a method based on detection of misbehavior,We
need a reasonable power consumption.
We propose that packets of malicious nodes should not be
forworded by normally behaving nodes.it is disavantageous for
nodes to behave maliciouly
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Selsh Gene
The selsh gene Richard explains , there is an intrinsic motivation
for cooperation because of instatnt gratication.The benet of
behaving well is not abvious when there is delay between granting a
favor and the repayment.
According to dowkins , simulation has shown when starting
with a majority population of cheats and marginal group of
both suckers and grudgers , the grudgers win overtime.
Once the suckers are extinct,the grudgers grow rapidly at the
expense of the cheats , because they do not help a cheat twice.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Selsh Gene
In a very large ad-hoc network , convergence can be very show
and keeping a history of all bad experiences with other
nodes,therefore we propose the following ideas :
Learn from observed behaviour :employ 'neighborhood
watch'to be warned by observing what happens to other nodes
in the neighborhood,before having to make a bad experience
oneself.
Learn from reported behaviour :share information of
experienced malicious behavior with friends and also learn from
them.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
We now describe the components of CONFIDANT, assumed to be
present in every node :
The Monitor
The Reputation System
The Path Manager
The Trust Manager
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
The Monitor :
One approach to protocol enforcement and detection of
damaging behaviour suggested here is equivalent of a
neighborhood watch,where nodes locally look for deviating
nodes.
The Monitor registers these deviations from normal
behaviour.As soon as a given bad behaviour occurs , the
reputation system is called.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
The Trust Manager :this component deals with incoming and
outgo- ing ALARM messages.
ALARM messages are sebt by the trust manager of a node to
warn others of malicious nodes .
Outgoing alarms are sent by a node to its friends after having
experienced, observed or received a report of malicious
behavior.
Incoming alarms originate from either outside friends or other
nodes, so the source of an alarm has to be checked for
trustworthiness before triggering a reaction.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
A mechanism similar to the trust management in PGP is used
here for determining if there is enough trusted evidence for the
misbehavior of a node.
The Trust Manager consists of the following components :
An alarm table containing information about received alarms.
A trust table managing trust levels for nodes to determine the
trustworthiness of an alarm.
A friends list containing all friends a node potentially sends
alarms to.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
The Reputation system in this protocol manages a table
consisting of entries for nodes and their rating.The rating is then
changed according to a rate function that assigns dierent weights
to the type of behavior detection , namely the greatest weight for
own experience . Once the weight has been determined the entry of
the node that misbehaved is changed accordingly.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
The Path Manager performs the following :
Path re-ranking according to security metric,such as reputation
of nodes in the path.
Deletion of oaths containing malicious nodes.
Action on receiving a request for a route from a malicious
node .
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
CONFIDANT COMPONENTS
Protocol Description : what constitutes the signicant rating can
be dened for dierent types of nodes according to their security
requirements.If the occurence theshold is exeeded ,The Reputation
System Updates the rating of the node that caused the event .In
order to convey warming information,an ALARM message is sent by
the Trust Manager.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
How the components functions
The Monitor of each node evaluates, on the basis of its
observations, the behavior nodes in respect of the routing function.
Once the monitor detects a suspicious event, it sends information
to the system reputation.
The latter update maintains reputation values ratings of each node
observed. To remedy the imprecision of detection mechanisms and
a system that converges faster, Condant uses the principle of
mutual recommendations between network nodes.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
How the components functions
This role is played by the trust manager who takes care of a part,
the decision to make regarding the sharing of reputation values and
secondly, the how to aggregate all the recommendations received.
Condant considers only negative recommendations.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
How the components functions
Finally, the path manager is used in the order to select the optimal
path in terms of reliability of the nodes that compose and may
decide not to route packets nodes with notes reputation global
below the tolerated by the system.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Performance Analysis
We present a performance analysis of( DSR )fortied by
CONFIDANT ,The aim of this performance analysis is to determine
the impact of the CONFIDANT routing protocol extensions on
metrics.The regular DSR protocol is used as a reference .
Our goal is also to learn how protocol parameters such as
thresholds should be set.
The Metrics used are Goodput, Overhead and Utility.
Goodput(G) = Total packets received/ Total packets
originated
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Performance Analysis
for the performance analysis ,the metrics are observed in various
network .The rst network we analyse is a reguler well behaved
DSR network which is used as a refernce.The second enhancement
is to include the case when the neighbor node fails to forward a
packet for some other node and it is detected.
In the simulation,every benign node is a friend of the source and
informs the source when packets are maliciously dropped by the
next hope.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Performance Analysis
Simulation Results :in the defenseless network ,the number of
packets dropped intentionally is up to two orders of magnitude
greater than in the network fortied by condant.When looking at
the number dropped from a network size perspective ,it can be seen
from gure 3 that the dierence in performance increases with the
total number of nodes in the network.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Performance Analysis
Estimation of factor Relevance :the choice for the number of
nodes was made with the intention to show both a very small
network that still allows for multiple paths and reasonable network
connectivity given the area and a larger network to get insights on
scalability.
The extreme levels for the percentage of malicious nodes in the
network population are motivated by the desire to show the
behavior of a network.
This can be explained by the fact that the number of packets
dropped in a fortied network in the presence of one third malicious.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Future Work
The threshold value used to change a node's rating.
Methods to eciently distribute reputation information to
avoid malicious nodes as early as possible.
CONFIDANT assumes that nodes are authenticated and that
no node can pretend to beanother.If a node is compromised
then it could send ALARMs about a benign node to its
neighbors and propagate this by pretending to be another
node.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol
Conclusion
Mobile ad-hoc networks shows new vulnerabilities to malicious
attacks .So special care has to be taken to include fairness
mechanisms.Obserable attacks on forwarding and routing in mobile
ad-hoc networks can be thwarted by the suggested CONFIDANT
scheme of detection.
The CONFIDANT Protocol is scalable in terms of total number of
nodes in a network and performs well event with a fraction of
malicious nodes.
Hamza Hammami
Performane Analysis Of The CONFIDANT Protocol

More Related Content

What's hot

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionIJARIIT
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
The Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseThe Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseAM Publications
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
C241721
C241721C241721
C241721irjes
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 

What's hot (12)

A1803050106
A1803050106A1803050106
A1803050106
 
Fc3110291035
Fc3110291035Fc3110291035
Fc3110291035
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and Prevention
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
The Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseThe Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle Expertise
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
20120140502009
2012014050200920120140502009
20120140502009
 
C241721
C241721C241721
C241721
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 

Similar to Presentation

JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)IOSR Journals
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationIJERA Editor
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorIJECEIAES
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network securitychella mani
 

Similar to Presentation (20)

JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classification
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Hybrid honeypots for network security
Hybrid honeypots for network securityHybrid honeypots for network security
Hybrid honeypots for network security
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Presentation

  • 1. Performane Analysis Of The CONFIDANT Protocol (Cooperation Of Nodes :Fairness In Dynamic Ad-hoc Networks) Hamza Hammami 12 décembre 2012 Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 2. Introduction The Condant protocol works as an extension to a reactive source routing protocol for mobile ad-hoc networks. CONFIDANT aims at making misbehavior in mobile ad hoc networks unattractive. It is based on selective altruism and utilitarianism. We present a performance analysis of DSR fortied by CONFIDANT and compare it to regular defenseless DSR. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 3. The DSR Protocol The DSR Protocol it is a protocol developed for routing in a mobile ad-hoc networks. After receiving routes, the source node selects the best, stores it and sends messages along that path. A link failure is detected by a node that cannot forward the packet to the next node in the source route. It then sends a ROUTE ERROR message to the source. Packets are then forwarded along an alternate route that does not contain the bad link. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 4. Attacks against routing The lack of infrastructure of mobile ad-hoc networks oer special chance to attacks.We should provide a proper security to protect against the following attacks : No Forwarding(of control message of data). Trac deviation(advertises manu excellent routes or advertises routes very rapidly so they are deemend good routes). Route salvaging. Lack of error messages. Unusually frequent route updates. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 5. Thwarting Attack The aim is prevention ,We should provide perfect mechanism.Most attacks have been the result of by passing prevention mechanisms. We propose a method based on detection of misbehavior,We need a reasonable power consumption. We propose that packets of malicious nodes should not be forworded by normally behaving nodes.it is disavantageous for nodes to behave maliciouly Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 6. Selsh Gene The selsh gene Richard explains , there is an intrinsic motivation for cooperation because of instatnt gratication.The benet of behaving well is not abvious when there is delay between granting a favor and the repayment. According to dowkins , simulation has shown when starting with a majority population of cheats and marginal group of both suckers and grudgers , the grudgers win overtime. Once the suckers are extinct,the grudgers grow rapidly at the expense of the cheats , because they do not help a cheat twice. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 7. Selsh Gene In a very large ad-hoc network , convergence can be very show and keeping a history of all bad experiences with other nodes,therefore we propose the following ideas : Learn from observed behaviour :employ 'neighborhood watch'to be warned by observing what happens to other nodes in the neighborhood,before having to make a bad experience oneself. Learn from reported behaviour :share information of experienced malicious behavior with friends and also learn from them. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 8. CONFIDANT COMPONENTS We now describe the components of CONFIDANT, assumed to be present in every node : The Monitor The Reputation System The Path Manager The Trust Manager Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 9. CONFIDANT COMPONENTS The Monitor : One approach to protocol enforcement and detection of damaging behaviour suggested here is equivalent of a neighborhood watch,where nodes locally look for deviating nodes. The Monitor registers these deviations from normal behaviour.As soon as a given bad behaviour occurs , the reputation system is called. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 10. CONFIDANT COMPONENTS The Trust Manager :this component deals with incoming and outgo- ing ALARM messages. ALARM messages are sebt by the trust manager of a node to warn others of malicious nodes . Outgoing alarms are sent by a node to its friends after having experienced, observed or received a report of malicious behavior. Incoming alarms originate from either outside friends or other nodes, so the source of an alarm has to be checked for trustworthiness before triggering a reaction. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 11. CONFIDANT COMPONENTS A mechanism similar to the trust management in PGP is used here for determining if there is enough trusted evidence for the misbehavior of a node. The Trust Manager consists of the following components : An alarm table containing information about received alarms. A trust table managing trust levels for nodes to determine the trustworthiness of an alarm. A friends list containing all friends a node potentially sends alarms to. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 12. CONFIDANT COMPONENTS The Reputation system in this protocol manages a table consisting of entries for nodes and their rating.The rating is then changed according to a rate function that assigns dierent weights to the type of behavior detection , namely the greatest weight for own experience . Once the weight has been determined the entry of the node that misbehaved is changed accordingly. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 13. CONFIDANT COMPONENTS The Path Manager performs the following : Path re-ranking according to security metric,such as reputation of nodes in the path. Deletion of oaths containing malicious nodes. Action on receiving a request for a route from a malicious node . Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 14. CONFIDANT COMPONENTS Protocol Description : what constitutes the signicant rating can be dened for dierent types of nodes according to their security requirements.If the occurence theshold is exeeded ,The Reputation System Updates the rating of the node that caused the event .In order to convey warming information,an ALARM message is sent by the Trust Manager. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 15. How the components functions The Monitor of each node evaluates, on the basis of its observations, the behavior nodes in respect of the routing function. Once the monitor detects a suspicious event, it sends information to the system reputation. The latter update maintains reputation values ratings of each node observed. To remedy the imprecision of detection mechanisms and a system that converges faster, Condant uses the principle of mutual recommendations between network nodes. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 16. How the components functions This role is played by the trust manager who takes care of a part, the decision to make regarding the sharing of reputation values and secondly, the how to aggregate all the recommendations received. Condant considers only negative recommendations. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 17. How the components functions Finally, the path manager is used in the order to select the optimal path in terms of reliability of the nodes that compose and may decide not to route packets nodes with notes reputation global below the tolerated by the system. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 18. Performance Analysis We present a performance analysis of( DSR )fortied by CONFIDANT ,The aim of this performance analysis is to determine the impact of the CONFIDANT routing protocol extensions on metrics.The regular DSR protocol is used as a reference . Our goal is also to learn how protocol parameters such as thresholds should be set. The Metrics used are Goodput, Overhead and Utility. Goodput(G) = Total packets received/ Total packets originated Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 19. Performance Analysis for the performance analysis ,the metrics are observed in various network .The rst network we analyse is a reguler well behaved DSR network which is used as a refernce.The second enhancement is to include the case when the neighbor node fails to forward a packet for some other node and it is detected. In the simulation,every benign node is a friend of the source and informs the source when packets are maliciously dropped by the next hope. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 20. Performance Analysis Simulation Results :in the defenseless network ,the number of packets dropped intentionally is up to two orders of magnitude greater than in the network fortied by condant.When looking at the number dropped from a network size perspective ,it can be seen from gure 3 that the dierence in performance increases with the total number of nodes in the network. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 21. Performance Analysis Estimation of factor Relevance :the choice for the number of nodes was made with the intention to show both a very small network that still allows for multiple paths and reasonable network connectivity given the area and a larger network to get insights on scalability. The extreme levels for the percentage of malicious nodes in the network population are motivated by the desire to show the behavior of a network. This can be explained by the fact that the number of packets dropped in a fortied network in the presence of one third malicious. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 22. Future Work The threshold value used to change a node's rating. Methods to eciently distribute reputation information to avoid malicious nodes as early as possible. CONFIDANT assumes that nodes are authenticated and that no node can pretend to beanother.If a node is compromised then it could send ALARMs about a benign node to its neighbors and propagate this by pretending to be another node. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol
  • 23. Conclusion Mobile ad-hoc networks shows new vulnerabilities to malicious attacks .So special care has to be taken to include fairness mechanisms.Obserable attacks on forwarding and routing in mobile ad-hoc networks can be thwarted by the suggested CONFIDANT scheme of detection. The CONFIDANT Protocol is scalable in terms of total number of nodes in a network and performs well event with a fraction of malicious nodes. Hamza Hammami Performane Analysis Of The CONFIDANT Protocol