Skip to main content
Erschienen in: Wireless Networks 7/2014

01.10.2014

A trust enhanced secure clustering framework for wireless ad hoc networks

verfasst von: Pushpita Chatterjee, Uttam Ghosh, Indranil Sengupta, Soumya K. Ghosh

Erschienen in: Wireless Networks | Ausgabe 7/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure clustering in Wireless Ad Hoc Networks is a very important issue. Traditional cryptographic solution is useless against threats from internal compromised nodes. In light of this, we propose a novel distributed secure trust aware clustering protocol that provides secure solution for data delivery. A trust model is proposed that computes the trust of a node using self and recommendation evidences of its one-hop neighbors. Therefore, it is lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust. In addition, the proposed clustering protocol organizes the network into one-hop disjoint clusters and elects the most qualified, trustworthy node as a Clusterhead. This election is done by an authenticated voting scheme using parallel multiple signatures. Analysis of the protocol shows that it is more efficient and secure compared to similar existing schemes. Simulation results show that proposed protocol outperforms the popular ECS, CBRP and CBTRP in terms of throughput and packet delivery ratio with a reasonable communication overhead and latency in presence of malicious nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Balakrishnnan, V., Varadharajan, V., Tupakula, U. K., & Lucs, P. (2007). Trust and recommendations in mobile ad hoc networks. in Proceedings of 10th IEEE international conference on networking and services (pp. 64–69). Balakrishnnan, V., Varadharajan, V., Tupakula, U. K., & Lucs, P. (2007). Trust and recommendations in mobile ad hoc networks. in Proceedings of 10th IEEE international conference on networking and services (pp. 64–69).
2.
Zurück zum Zitat Chatterjee, P., Sengupta, I., & Ghosh, S. (2012). Stacrp: A secure trust based auction oriented clustering routing protocol for securing mobile ad hoc networks. Cluster Computing, 15, 303–320.CrossRef Chatterjee, P., Sengupta, I., & Ghosh, S. (2012). Stacrp: A secure trust based auction oriented clustering routing protocol for securing mobile ad hoc networks. Cluster Computing, 15, 303–320.CrossRef
3.
Zurück zum Zitat Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143. Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.
4.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2000, November). An on-demand weighted clustering algorithm WCA for ad hoc networks. in Proceedings of IEEE GLOBECOM 2000 (pp. 1697–1701). Chatterjee, M., Das, S. K., & Turgut, D. (2000, November). An on-demand weighted clustering algorithm WCA for ad hoc networks. in Proceedings of IEEE GLOBECOM 2000 (pp. 1697–1701).
5.
Zurück zum Zitat Malpani, N., Welch, J., & Vaidya N. (2000, August). Leader election algorithms for mobile ad hoc networks. in Proceedings of 4th international workshop on discrete algorithms and methods for mobile computing and communications (pp. 96–103). Malpani, N., Welch, J., & Vaidya N. (2000, August). Leader election algorithms for mobile ad hoc networks. in Proceedings of 4th international workshop on discrete algorithms and methods for mobile computing and communications (pp. 96–103).
6.
Zurück zum Zitat Vasudevan, S., Decleene, B., Immerman, N., Kurose, J., & Towsley, D. (2003). Leader election algorithms for wireless ad hoc networks. in Proceedings of DARPA information survivability conference and exposition (pp. 261–272). Vasudevan, S., Decleene, B., Immerman, N., Kurose, J., & Towsley, D. (2003). Leader election algorithms for wireless ad hoc networks. in Proceedings of DARPA information survivability conference and exposition (pp. 261–272).
7.
Zurück zum Zitat Yu, Y., Wang, J., Song, M., & Song, J. (2010). Network traffic prediction and result analysis based on seasonal ARIMA and correlation coefficient. in Proceedings of the 2010 international conference on intelligent system design and engineering application, ISDEA’10 (Vol. 01, pp. 980–983). Yu, Y., Wang, J., Song, M., & Song, J. (2010). Network traffic prediction and result analysis based on seasonal ARIMA and correlation coefficient. in Proceedings of the 2010 international conference on intelligent system design and engineering application, ISDEA’10 (Vol. 01, pp. 980–983).
8.
Zurück zum Zitat Stoica, P., Friedlander, B., & Soderstrom, T. (1986). Least-squares, yule-walker, and overdetermined yule-walker estimation of ar parameters: A monte carlo analys is of finite-sample properties. International Journal of Control, 43, 13–27.CrossRefMATH Stoica, P., Friedlander, B., & Soderstrom, T. (1986). Least-squares, yule-walker, and overdetermined yule-walker estimation of ar parameters: A monte carlo analys is of finite-sample properties. International Journal of Control, 43, 13–27.CrossRefMATH
9.
10.
Zurück zum Zitat Dempster, A. P. (1968). A generalization of bayesian interface. Journal of Royal Statistical Society, 30, 205–447.MathSciNetMATH Dempster, A. P. (1968). A generalization of bayesian interface. Journal of Royal Statistical Society, 30, 205–447.MathSciNetMATH
11.
Zurück zum Zitat Shieh, S.-P., Lin, C.-T. Yang, W.-B., & Sun, H.-M. (2000). Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, 49(4), 1464–1473.CrossRef Shieh, S.-P., Lin, C.-T. Yang, W.-B., & Sun, H.-M. (2000). Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, 49(4), 1464–1473.CrossRef
12.
Zurück zum Zitat Bettstetter, C., & Konig, S. (2002). On the message and time complexity of a distributed mobility-adaptive clustering algorithm in wireless ad hoc networks. in Proceeding of the 4th European wireless (pp. 128–134). Bettstetter, C., & Konig, S. (2002). On the message and time complexity of a distributed mobility-adaptive clustering algorithm in wireless ad hoc networks. in Proceeding of the 4th European wireless (pp. 128–134).
13.
Zurück zum Zitat Sucec, J., & Marsic, I. (2001). Hierarchical routing overhead in mobile ad hoc netorks. IEEE Transactions on Mobile Computing, 3, 45–56. Sucec, J., & Marsic, I. (2001). Hierarchical routing overhead in mobile ad hoc netorks. IEEE Transactions on Mobile Computing, 3, 45–56.
14.
Zurück zum Zitat Cho, J.-H., Swami, A., & Chen, I.-R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012. Cho, J.-H., Swami, A., & Chen, I.-R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.
15.
Zurück zum Zitat Yu, J. Y., & Chong, P. H. J. (2006). An efficient clustering scheme for large and dense mobile ad hoc networks (manets). Computer Communications, 30, 5–16.CrossRef Yu, J. Y., & Chong, P. H. J. (2006). An efficient clustering scheme for large and dense mobile ad hoc networks (manets). Computer Communications, 30, 5–16.CrossRef
16.
Zurück zum Zitat Chiang, C. -C., Wu, H. -K., Liu, W., & Gerla, M. (1997, April). Routing in clustered multihop, mobile wireless networks with fading channel. in IEEE Singapore international conference on networks, SICON’97, (pp. 197–211). Chiang, C. -C., Wu, H. -K., Liu, W., & Gerla, M. (1997, April). Routing in clustered multihop, mobile wireless networks with fading channel. in IEEE Singapore international conference on networks, SICON’97, (pp. 197–211).
17.
Zurück zum Zitat Safa, H., Artail, H., Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef Safa, H., Artail, H., Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef
18.
Zurück zum Zitat Fall, K., & Varadhan, K. ns Manual. isi.edu/nsnam/ns/doc. Fall, K., & Varadhan, K. ns Manual. isi.edu/nsnam/ns/doc.
19.
Zurück zum Zitat Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.CrossRef Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.CrossRef
20.
Zurück zum Zitat Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823. Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.
21.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04) (Vol. 26, pp. 47–54), Dunedin, New Zealand. Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04) (Vol. 26, pp. 47–54), Dunedin, New Zealand.
22.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2004, May). Collaborative trust-based routing in multi-hop ad hoc networks. in Proceedings of 3rd international IFIP-TC06 networking conference, Lecture Notes in Computer Science (pp. 1446–1451). Ghosh, T., Pissinou, N., & Makki, K. (2004, May). Collaborative trust-based routing in multi-hop ad hoc networks. in Proceedings of 3rd international IFIP-TC06 networking conference, Lecture Notes in Computer Science (pp. 1446–1451).
23.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trust routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10, 985–995.CrossRef Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trust routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10, 985–995.CrossRef
24.
Zurück zum Zitat Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005). Quantifying trust in mobile ad hoc networks. In Proceedings of IEEE KIMAS 2005 (pp. 65–71). Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005). Quantifying trust in mobile ad hoc networks. In Proceedings of IEEE KIMAS 2005 (pp. 65–71).
25.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.
26.
Zurück zum Zitat Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In Proceedings of the 5th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’08) (pp. 88–95). New York, NY: ACM. Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In Proceedings of the 5th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’08) (pp. 88–95). New York, NY: ACM.
27.
Zurück zum Zitat Cho, J.-H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012. Cho, J.-H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.
Metadaten
Titel
A trust enhanced secure clustering framework for wireless ad hoc networks
verfasst von
Pushpita Chatterjee
Uttam Ghosh
Indranil Sengupta
Soumya K. Ghosh
Publikationsdatum
01.10.2014
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2014
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-014-0701-6

Weitere Artikel der Ausgabe 7/2014

Wireless Networks 7/2014 Zur Ausgabe

Neuer Inhalt