Abstract
The contribution of mobile agents in existing wireless network is basically to cater up the connectivity demands. However, adoption of mobile agents in decentralized system like Mobile Adhoc Network (MANET) is found to be highly vulnerable where there is few evidence of offering security legitimacy of services offered by mobile agents. The security problem becomes highly challenging if adversary dynamically alters the attack tactics. Therefore, the proposed system introduces a novel analytical model which is capable of capturing the malicious behavior of mobile agent and quarantines them from further spreading the intrusion. Utilizing probability modeling, the proposed system introduces a resistance on the basis of intensive evaluation of local and global trust. The study outcome of proposed system shows that it offers better communication performance along with security in contrast to existing communication scheme in MANET.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cooper, C.: Apples cook: 172 million post-PC devices in the last year. Technical report, CNET, New York, NY, USA, March 2012
Sarkar, S., Datta, R.: Mobility-aware route selection technique for mobile ad hoc networks. IET Wirel. Sens. Syst. 7(3), 55–64 (2017)
Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8(3), 253–266 (2010)
Marwaha, S., Tham, C.K., Srinivasan, D.: Mobile agents based routing protocol for mobile ad hoc networks. In: Global Telecommunications Conference, GLOBECOM 2002, vol. 1, pp. 163–167. IEEE, Taipei (2002)
Channappagoudar, M.B., Venkataram, P.: Mobile agent based node monitoring protocol for MANETs. In: 2013 National Conference on Communications (NCC), New Delhi, India, pp. 1–5 (2013)
Rohankar, R.: Agent based predictive data collection in opportunistic wireless sensor network. Procedia Comput. Sci. 57, 33–40 (2015)
Halim, I.T.A., Hossam, M.A., Fahmy, A.M.B., El-Shafey, M.H.: Agent-based trusted on-demand routing protocol for mobile ad hoc networks. In: 2010 Fourth International Conference on Network and System Security, pp. 255–262. IEEE (2010)
Abosamra, A., Hashem, M., Darwish, G.: Securing DSR with mobile agents in wireless ad hoc networks. Egyptian Inf. J. 12(1), 29–36 (2011)
García-Magariño, I., Lacuesta, R., Lloret, J.: Agent-based simulation of smart beds with Internet-of-Things for exploring big data analytics. IEEE Access 6, 366–379 (2018)
Fortino, G., Russo, W., Savaglio, C., Shen, W., Zhou, M.: Agent-oriented cooperative smart objects: from IoT system design to implementation. IEEE Trans. Syst. Man Cybern.: Syst. 99, 1–18 (2017)
Wang, N., Li, J.: Shortest path routing with risk control for compromised wireless sensor networks. IEEE Access 7, 19303–19311 (2019)
Gargees, R.S., Scott, G.J.: Dynamically scalable distributed virtual framework based on agents and pub/sub pattern for IoT media data. IEEE IoT J. 6(1), 599–613 (2019)
Quan, Y., Chen, W., Zhihai, W., Peng, L.: Distributed fault detection for second-order delayed multi-agent systems with adversaries. IEEE Access 5, 16478–16483 (2017)
Wang, D., Wang, W.: Distributed fault detection and isolation for discrete time multi-agent systems. In: Computational Intelligence, Networked Systems and Their Applications, pp. 496–505. Springer, Berlin (2014)
Harrabi, S., Jaafar, I.B., Ghedira, K.: Message dissemination in vehicular networks on the basis of agent technology. Wirel. Pers. Commun. 96(4), 6129–6146 (2017)
Fortino, G., Gravina, R., Russo, W., Savaglio, C.: Modeling and simulating Internet-of-Things systems: a hybrid agent-oriented approach. Comput. Sci. Eng. 19(5), 68–76 (2017)
Santos, J., Rodrigues, J.J., Casal, J., Saleem, K., Denisov, V.: Intelligent personal assistants based on internet of things approaches. IEEE Syst. J. 12(2), 1793–1802 (2018)
Shehada, D., Yeun, C.Y., Zemerly, M.J., Al-Qutayri, M., Al-Hammadi, Y., Hu, J.: A new adaptive trust and reputation model for mobile agent systems. J. Netw. Comput. Appl. 124, 33–43 (2018)
Hsieh, H.-C., Chang, K.-D., Wang, L.-F., Chen, J.-L., Chao, H.-C.: ScriptIoT: a script framework for and internet-of-things applications. IEEE IoT J. 3(4), 628–636 (2015)
Lu, S., Li, L., Lam, K., Jia, L.: SAODV: a MANET routing protocol that can withstand black hole attack. In: 2009 International Conference on Computational Intelligence and Security, Beijing, pp. 421–425 (2009)
Papadimitratos, P., Haas, Z.J.: Secure link state routing for mobile ad hoc networks. In: Proceedings of 2003 Symposium on Applications and the Internet Workshops, Orlando, FL, USA, pp. 379–383 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chethan, B.K., Siddappa, M., Jayanna, H.S. (2019). An Analytical Modeling for Boosting Malicious Mobile Agent Participation in Mobile Adhoc Network. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Intelligent Systems Applications in Software Engineering. CoMeSySo 2019 2019. Advances in Intelligent Systems and Computing, vol 1046. Springer, Cham. https://doi.org/10.1007/978-3-030-30329-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-30329-7_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30328-0
Online ISBN: 978-3-030-30329-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)