Skip to main content
Erschienen in: Distributed and Parallel Databases 2/2013

01.06.2013

CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies

verfasst von: Wenjia Li, Anupam Joshi, Tim Finin

Erschienen in: Distributed and Parallel Databases | Ausgabe 2/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: MobiHoc’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002) CrossRef Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: MobiHoc’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002) CrossRef
2.
Zurück zum Zitat Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 191–199. IEEE Press, New York (2005) CrossRef Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 191–199. IEEE Press, New York (2005) CrossRef
3.
Zurück zum Zitat Li, W., Parker, J., Joshi, A.: Security through collaboration in manets. In: Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 696–714. Springer, Berlin (2008) Li, W., Parker, J., Joshi, A.: Security through collaboration in manets. In: Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 696–714. Springer, Berlin (2008)
4.
Zurück zum Zitat Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM’09, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2009) CrossRef Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM’09, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2009) CrossRef
5.
Zurück zum Zitat Li, W., Joshi, A., Finin, T.: Policy-based malicious peer detection in ad hoc networks. In: Proceedings of the International Conference on Computational Science and Engineering, CSE’09, vol. 3, pp. 76–82. IEEE Comput. Soc., Los Alamitos (2009) CrossRef Li, W., Joshi, A., Finin, T.: Policy-based malicious peer detection in ad hoc networks. In: Proceedings of the International Conference on Computational Science and Engineering, CSE’09, vol. 3, pp. 76–82. IEEE Comput. Soc., Los Alamitos (2009) CrossRef
6.
Zurück zum Zitat Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mobile Networks and Applications (MONET) 17(3), 342–352 (2012) CrossRef Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mobile Networks and Applications (MONET) 17(3), 342–352 (2012) CrossRef
7.
Zurück zum Zitat Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283. ACM, New York (2000) Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283. ACM, New York (2000)
8.
Zurück zum Zitat Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000) Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000)
9.
Zurück zum Zitat Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe’04: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004) Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe’04: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004)
10.
Zurück zum Zitat Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006) CrossRef Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006) CrossRef
11.
Zurück zum Zitat Parker, J., Patwardhan, A., Joshi, A.: Cross-layer analysis for detecting wireless misbehavior. In: Proceedings of the Third IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 6–9. IEEE Press, New York (2006) CrossRef Parker, J., Patwardhan, A., Joshi, A.: Cross-layer analysis for detecting wireless misbehavior. In: Proceedings of the Third IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 6–9. IEEE Press, New York (2006) CrossRef
12.
Zurück zum Zitat Buchegger, S., Le Boudee, J.-Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005) CrossRef Buchegger, S., Le Boudee, J.-Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005) CrossRef
13.
Zurück zum Zitat Yau, P.-W., Mitchell, C.J.: Security vulnerabilities in ad hoc networks. In: Proceedings of the 7th International Symposium on Communication Theory and Applications, pp. 99–104 (2003) Yau, P.-W., Mitchell, C.J.: Security vulnerabilities in ad hoc networks. In: Proceedings of the 7th International Symposium on Communication Theory and Applications, pp. 99–104 (2003)
14.
Zurück zum Zitat Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic, Dordrecht (2002) Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic, Dordrecht (2002)
15.
Zurück zum Zitat Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999) CrossRef Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999) CrossRef
16.
Zurück zum Zitat Deng, H., Zeng, Q.-A., Agrawal, D.: Svm-based intrusion detection system for wireless ad hoc networks. In: Proceedings of 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall vol. 3, pp. 2147–2151 (2003). 2003 CrossRef Deng, H., Zeng, Q.-A., Agrawal, D.: Svm-based intrusion detection system for wireless ad hoc networks. In: Proceedings of 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall vol. 3, pp. 2147–2151 (2003). 2003 CrossRef
17.
Zurück zum Zitat Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for aodv. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134. ACM, New York (2003) CrossRef Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for aodv. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134. ACM, New York (2003) CrossRef
18.
Zurück zum Zitat Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147. ACM, New York (2003) CrossRef Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147. ACM, New York (2003) CrossRef
19.
Zurück zum Zitat Li, W., Joshi, A., Finin, T.: Atm: automated trust management for mobile ad hoc networks using support vector machine. In: 12th IEEE International Conference on Mobile Data Management (MDM), pp. 291–292 (2011) CrossRef Li, W., Joshi, A., Finin, T.: Atm: automated trust management for mobile ad hoc networks using support vector machine. In: 12th IEEE International Conference on Mobile Data Management (MDM), pp. 291–292 (2011) CrossRef
20.
Zurück zum Zitat Li, W., Joshi, A., Finin, T.: Sat: an svm-based automated trust management system for mobile ad-hoc networks. In: 2011 IEEE Military Communications Conference (MILCOM2011), pp. 1102–1107 (2011) Li, W., Joshi, A., Finin, T.: Sat: an svm-based automated trust management system for mobile ad-hoc networks. In: 2011 IEEE Military Communications Conference (MILCOM2011), pp. 1102–1107 (2011)
21.
Zurück zum Zitat Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom’03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM, New York (2003) Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom’03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM, New York (2003)
22.
Zurück zum Zitat Xue, Y., Nahrstedt, K.: Providing fault-tolerant ad hoc routing service in adversarial environments. Wirel. Pers. Commun. 29(3–4), 367–388 (2004) CrossRef Xue, Y., Nahrstedt, K.: Providing fault-tolerant ad hoc routing service in adversarial environments. Wirel. Pers. Commun. 29(3–4), 367–388 (2004) CrossRef
23.
Zurück zum Zitat Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 91–100. ACM, New York (2006) CrossRef Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 91–100. ACM, New York (2006) CrossRef
24.
Zurück zum Zitat Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon (2003) Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon (2003)
25.
Zurück zum Zitat He, Q., Wu, D., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC’04, vol. 2, pp. 825–830 (2004) He, Q., Wu, D., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC’04, vol. 2, pp. 825–830 (2004)
26.
Zurück zum Zitat Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003) Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003)
27.
Zurück zum Zitat Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous’06, pp. 1–8 (2006) CrossRef Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous’06, pp. 1–8 (2006) CrossRef
28.
Zurück zum Zitat Ren, Y., Boukerche, A.: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In: Proceedings of 2009 IEEE International Conference on Communications, ICC’09, pp. 1–5 (2009) CrossRef Ren, Y., Boukerche, A.: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In: Proceedings of 2009 IEEE International Conference on Communications, ICC’09, pp. 1–5 (2009) CrossRef
29.
Zurück zum Zitat Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management 2, 333–360 (1994) CrossRef Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management 2, 333–360 (1994) CrossRef
30.
Zurück zum Zitat Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003 (2003) Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003 (2003)
31.
Zurück zum Zitat Godik, S., Moses, T.: Oasis Extensible Access Control Markup Language (xacml) (2002) Godik, S., Moses, T.: Oasis Extensible Access Control Markup Language (xacml) (2002)
32.
Zurück zum Zitat Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007) CrossRef Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007) CrossRef
34.
Zurück zum Zitat Eriksson, J., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: The Sixth Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2008), Breckenridge, USA (2008) Eriksson, J., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: The Sixth Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2008), Breckenridge, USA (2008)
35.
Zurück zum Zitat Carroll, J.J., Dickinson, I., Dollin, C., Reynolds, D., Seaborne, A., Wilkinson, K.: Jena: implementing the semantic web recommendations. In: Proceedings of the 13th International World Wide Web Conference, WWW 2004, pp. 74–83. ACM, New York (2004) Carroll, J.J., Dickinson, I., Dollin, C., Reynolds, D., Seaborne, A., Wilkinson, K.: Jena: implementing the semantic web recommendations. In: Proceedings of the 13th International World Wide Web Conference, WWW 2004, pp. 74–83. ACM, New York (2004)
36.
Zurück zum Zitat Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11, 1–21 (1969) CrossRef Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11, 1–21 (1969) CrossRef
37.
Zurück zum Zitat Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976) MATH Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976) MATH
38.
Zurück zum Zitat Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: a library for parallel simulation of large-scale wireless networks. ACM SIGSIM Simulation Digest 28(1), 154–161 (1998) CrossRef Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: a library for parallel simulation of large-scale wireless networks. ACM SIGSIM Simulation Digest 28(1), 154–161 (1998) CrossRef
39.
Zurück zum Zitat Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management, MDM’10, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2010) Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management, MDM’10, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2010)
Metadaten
Titel
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
verfasst von
Wenjia Li
Anupam Joshi
Tim Finin
Publikationsdatum
01.06.2013
Verlag
Springer US
Erschienen in
Distributed and Parallel Databases / Ausgabe 2/2013
Print ISSN: 0926-8782
Elektronische ISSN: 1573-7578
DOI
https://doi.org/10.1007/s10619-012-7113-3

Weitere Artikel der Ausgabe 2/2013

Distributed and Parallel Databases 2/2013 Zur Ausgabe

Premium Partner