Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

28.08.2019

Establishing Secure Routing Path Using Trust to Enhance Security in MANET

verfasst von: Vaishali V. Sarbhukan, Lata Ragha

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Because of versatility and portability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, mobile ad hoc network (MANET) has turned out to be one vital subject because of self arrangement and self upkeep ability. In any case, because of the open medium and dynamic topology MANET is experiencing numerous security powerlessness. Along these lines security is real obstruction in MANET. Trust management is one of the location based system to give security in MANET. Existing methodologies don’t abuse immediate and roundabout perceptions in the meantime to assess put stock in esteem. In many methodologies where circuitous technique is utilized, it comes about into erroneous trust esteem computation. Additionally existing methodologies don’t separate between control parcels and information bundles. Control bundles are more particular than information parcels in MANET. In this way proposed framework is created to upgrade security and also to enhance the execution of the framework. In proposed bound together trust administration conspire, spectator hub figures trust estimation of watched hub utilizing conviction work, Bayesian approach and Dempster Shafer Theory. In proposed conspire coordinate technique recognize assailant hub, hub having low trust esteem is declared as aggressor hub. The proposed plot enhances execution of brought together confide in administration framework.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Loo, J., Lloret, J., & Ortiz, J. H. (2011). Mobile Ad hoc networks: Current status and future trends. Boca Raton: CRC Press.CrossRef Loo, J., Lloret, J., & Ortiz, J. H. (2011). Mobile Ad hoc networks: Current status and future trends. Boca Raton: CRC Press.CrossRef
2.
Zurück zum Zitat Guan, Q., Yu, F. R., Jiang, S., & Leung, V. (2012). Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Transactions on Vehicular Technology,61(6), 2674–2685.CrossRef Guan, Q., Yu, F. R., Jiang, S., & Leung, V. (2012). Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Transactions on Vehicular Technology,61(6), 2674–2685.CrossRef
3.
Zurück zum Zitat Yu, F. R., Tang, H., Bu, S., & Zheng, D. (2013). Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking,2013, 188–190.CrossRef Yu, F. R., Tang, H., Bu, S., & Zheng, D. (2013). Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking,2013, 188–190.CrossRef
4.
Zurück zum Zitat Wang, Y., Yu, F. R., Tang, H., & Huang, M. (2014). A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transactions on Wireless Communications,13(3), 1616–1627.CrossRef Wang, Y., Yu, F. R., Tang, H., & Huang, M. (2014). A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transactions on Wireless Communications,13(3), 1616–1627.CrossRef
5.
Zurück zum Zitat Sun, Y., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2), 305–317.CrossRef Sun, Y., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2), 305–317.CrossRef
6.
Zurück zum Zitat Chapin, J., & Chan, V. W. (2011). The next 10 years of DoD wireless networking research. In Proceedings of IEEE military communications conference (pp. 2155–2245). Chapin, J., & Chan, V. W. (2011). The next 10 years of DoD wireless networking research. In Proceedings of IEEE military communications conference (pp. 2155–2245).
7.
Zurück zum Zitat Bu, S., Yu, F. R., Liu, P., Manson, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology,60(3), 1025–1036.CrossRef Bu, S., Yu, F. R., Liu, P., Manson, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology,60(3), 1025–1036.CrossRef
8.
Zurück zum Zitat Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Transactions on Wireless Communications,11, 38–47.CrossRef Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Transactions on Wireless Communications,11, 38–47.CrossRef
9.
Zurück zum Zitat Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications,8(2), 806–815.CrossRef Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications,8(2), 806–815.CrossRef
10.
Zurück zum Zitat Bu, S., Yu, F. R., Liu, X. P., & Tang, H. (2011). Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Transactions on Wireless Communications,10(9), 3064–3073.CrossRef Bu, S., Yu, F. R., Liu, X. P., & Tang, H. (2011). Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Transactions on Wireless Communications,10(9), 3064–3073.CrossRef
11.
Zurück zum Zitat Adjih, C., Raffo, D., & Muhlethaler, P. (2005). Attacks against OLSR: Distributed key management for security. In Presented at the 2nd OLSR Interop/Workshop, Palaiseau, France. Adjih, C., Raffo, D., & Muhlethaler, P. (2005). Attacks against OLSR: Distributed key management for security. In Presented at the 2nd OLSR Interop/Workshop, Palaiseau, France.
12.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.CrossRef Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.CrossRef
13.
Zurück zum Zitat Fang, Y., Zhu, X., & Zhang, Y. (2009). Securing resource-constrained wireless ad hoc networks. IEEE Wireless Communications,16(2), 24–30.CrossRef Fang, Y., Zhu, X., & Zhang, Y. (2009). Securing resource-constrained wireless ad hoc networks. IEEE Wireless Communications,16(2), 24–30.CrossRef
14.
Zurück zum Zitat Yu, F. R., Tang, H., Mason, P., & Wang, F. (2010). A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Transactions on Network and Service Management,7(4), 258–267.CrossRef Yu, F. R., Tang, H., Mason, P., & Wang, F. (2010). A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Transactions on Network and Service Management,7(4), 258–267.CrossRef
15.
Zurück zum Zitat Buchegger, S., & Le Boudec, J.-Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of 2nd workshop on economics peer-to-peer systems (pp. 1–6). Buchegger, S., & Le Boudec, J.-Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of 2nd workshop on economics peer-to-peer systems (pp. 1–6).
16.
Zurück zum Zitat Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2005). A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of 3rd ACM workshop on SASN (pp. 1–10). Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2005). A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of 3rd ACM workshop on SASN (pp. 1–10).
17.
Zurück zum Zitat Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the confidant protocol. In Proceedings of ACM MobiHoc (pp. 226–236). Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the confidant protocol. In Proceedings of ACM MobiHoc (pp. 226–236).
18.
Zurück zum Zitat Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef
19.
Zurück zum Zitat Josang, A., & LoPresti, S. (2004). Analyzing the relationship between risk and trust. In Proceedings of 2nd international conference on trust management (pp. 135–145). Springer, Berlin. Josang, A., & LoPresti, S. (2004). Analyzing the relationship between risk and trust. In Proceedings of 2nd international conference on trust management (pp. 135–145). Springer, Berlin.
Metadaten
Titel
Establishing Secure Routing Path Using Trust to Enhance Security in MANET
verfasst von
Vaishali V. Sarbhukan
Lata Ragha
Publikationsdatum
28.08.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06724-0

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt