Skip to main content

2016 | OriginalPaper | Buchkapitel

A Centralized Trust Computation (CTC) Model for Secure Group Formation in Military Based Mobile Ad Hoc Networks Using Stereotypes

verfasst von : S. Sivagurunathan, K. Prathapchandran

Erschienen in: Computational Intelligence, Cyber Security and Computational Models

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Self-organized, distributed nature of mobile nodes, frequent changes in topology and shared wireless medium and other characteristics make MANET differ from other networks and encourage military communications that can run on the top of MANET. At the same time, such characteristics pose security threats in military communication. As trust computations play a vital role in decision making and suitable for resource constrained devices, in this paper we propose a Centralized Trust Computation model (CTC) to ensure authentication, based on own experiences, recommendations, social and sense making trusts of team members evaluated by commanders that create an efficient and secure teams based on stereotypes model hence the adversaries who intentionally harm the mission and selfish members due to lack of resources can be identified and isolated from the network by the way authentication can be achieved and secure group can be formed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Perkins, C.E.: Ad Hoc Networking. Addision Wesley (2001) Perkins, C.E.: Ad Hoc Networking. Addision Wesley (2001)
2.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security. Pearson Education (2003) Stallings, W.: Cryptography and Network Security. Pearson Education (2003)
3.
Zurück zum Zitat Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995) Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)
5.
Zurück zum Zitat Wecik, K.E.: Sensemaking in Organizations. Sage, Thousand Oka (1995) Wecik, K.E.: Sensemaking in Organizations. Sage, Thousand Oka (1995)
6.
Zurück zum Zitat Wecik, K.E., Sutcliffe, K.M., Obsfeld, D.: Organizations and the Process of Sensemaking. (2005) Wecik, K.E., Sutcliffe, K.M., Obsfeld, D.: Organizations and the Process of Sensemaking. (2005)
7.
Zurück zum Zitat Cho, J.-H., Swamia, A., Chen, I.-R.: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35, 1002–1012 (2012)CrossRef Cho, J.-H., Swamia, A., Chen, I.-R.: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35, 1002–1012 (2012)CrossRef
8.
Zurück zum Zitat Sivagurunathan, S., Prathapchandran, K.: A light weight trust based security model for mobile ad hoc networks. In: Proceedings of the International Conference on Electrical, Instrumentations and Communication Engineering-Recent Trends and Research Issues (2015) Sivagurunathan, S., Prathapchandran, K.: A light weight trust based security model for mobile ad hoc networks. In: Proceedings of the International Conference on Electrical, Instrumentations and Communication Engineering-Recent Trends and Research Issues (2015)
9.
Zurück zum Zitat Velloso, P.B., Laufer, R.P., de Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: Trust management in mobile ad hoc networks using scalable maturity based model. IEEE Trans. Netw. Serv. Manag. 7, 3 (2010) Velloso, P.B., Laufer, R.P., de Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: Trust management in mobile ad hoc networks using scalable maturity based model. IEEE Trans. Netw. Serv. Manag. 7, 3 (2010)
10.
Zurück zum Zitat Arya, M., Jain, Y.K.: Grayhole attack and prevention in mobile ad hoc network. Int. J. Comput. Appl. 27(10), 21–26 (2011) Arya, M., Jain, Y.K.: Grayhole attack and prevention in mobile ad hoc network. Int. J. Comput. Appl. 27(10), 21–26 (2011)
11.
Zurück zum Zitat Manikandan, S.P., Manimegalai, R.: Trust based routing to mitigate black hole attack in MANET. Life Sci. J. 10(4), 490–498 (2013) Manikandan, S.P., Manimegalai, R.: Trust based routing to mitigate black hole attack in MANET. Life Sci. J. 10(4), 490–498 (2013)
12.
Zurück zum Zitat Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27, 4 (2005) Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27, 4 (2005)
13.
Zurück zum Zitat Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust based reactive routing protocols. IEEE Trans. Mob. Comput. 5(6), 695–710 (2006)CrossRef Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust based reactive routing protocols. IEEE Trans. Mob. Comput. 5(6), 695–710 (2006)CrossRef
14.
Zurück zum Zitat Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen trust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. (2003) Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen trust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. (2003)
15.
Zurück zum Zitat Govinda, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 14, 3 (2012) Govinda, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 14, 3 (2012)
16.
Zurück zum Zitat Ameza, F., Assam., N, Beghdad, R.: Defending AODV routing protocol against the black hole attack. Int. J. Comput. Sci. Inf. Secur. 8(2), 112–117 (2010) Ameza, F., Assam., N, Beghdad, R.: Defending AODV routing protocol against the black hole attack. Int. J. Comput. Sci. Inf. Secur. 8(2), 112–117 (2010)
Metadaten
Titel
A Centralized Trust Computation (CTC) Model for Secure Group Formation in Military Based Mobile Ad Hoc Networks Using Stereotypes
verfasst von
S. Sivagurunathan
K. Prathapchandran
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_40

Premium Partner