Skip to main content
Erschienen in: Mobile Networks and Applications 4/2017

20.03.2017

Design and Development of CTSR with Direct & Indirect Observations of MANET Applications

verfasst von: S. Sargunavathi, J. Martin Leo Manickam

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Prominent applications scenarios like military and commercial platforms mostly rely on wireless communications such as Wireless Sensor Networks (WSN), Mobile Ad-hoc Networks (MANET) and Vehicular Ad-hoc Networks (VANET). Based on the application scenario, the reliability of the nodes deployed has become more important for trust management evaluation. At the same time, trust management system should not be power killing, complex in terms of computation and processing capability. To convey a noticeable framework, we propose Collaborative Trust based Secure Routing protocol (CTSR) for observing direct and indirect trust values. Here we utilize two-way acknowledgement-based trust framework (2-ACKT) which requires lesser memory resources and minimizes the communication overhead. Our simulation setup for Mobile Adhoc Networks with 2-ACKT framework calculates trust value with both direct and indirect observations based on Bayesian inference and Dempster-Shafer Theory (DST) of uncertain reasoning approach respectively. Since the inception of DST for indirect observation in wireless networks trust values are effectively derived with data packets and control packets. The capability of DST to solve the problems with different reliability has flaws in certain areas where the nodes were subjected to disclose critical information like residual energy level and available bandwidth. And also common results derived from DST may lead to uncertain decisions. Considering all these factors we make few notable modifications in DST to enhance the security feature in 2-ACT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Refaei M, DaSilva L, Eltoweissy M, Nadeem T (2010) Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans Comput 59(5):707–719MathSciNetCrossRefMATH Refaei M, DaSilva L, Eltoweissy M, Nadeem T (2010) Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans Comput 59(5):707–719MathSciNetCrossRefMATH
2.
Zurück zum Zitat Kurosawa S, Nakayama H, Kato N, Jamalipour A (2006) Detecting Blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int’l J Netw Secur 105(627):65–68 Kurosawa S, Nakayama H, Kato N, Jamalipour A (2006) Detecting Blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int’l J Netw Secur 105(627):65–68
4.
Zurück zum Zitat Zadeh L (1984) Review of a Mathematical Theory of Evidence. AI Magazine 5(3):81 Zadeh L (1984) Review of a Mathematical Theory of Evidence. AI Magazine 5(3):81
5.
Zurück zum Zitat Wei Z, Tang H, Yu FRR, Wang M (2013) Security enhancement for mobile ad hoc networks routing with OLSRv2. In: SPIE defense, security, and sensing. International Society for Optics and Photonics, pp 87550C Wei Z, Tang H, Yu FRR, Wang M (2013) Security enhancement for mobile ad hoc networks routing with OLSRv2. In: SPIE defense, security, and sensing. International Society for Optics and Photonics, pp 87550C
6.
Zurück zum Zitat Konishi K et al (2005) Mobireal simulator-evaluating manet applications in real environments. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. IEEE Konishi K et al (2005) Mobireal simulator-evaluating manet applications in real environments. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. IEEE
7.
Zurück zum Zitat Felix J, Joseph C, Lee B-S, Das A, Seet B (2011) Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Trans Dependable Secure Comput 8(2):233–245 Felix J, Joseph C, Lee B-S, Das A, Seet B (2011) Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Trans Dependable Secure Comput 8(2):233–245
8.
Zurück zum Zitat Anita X, Manickam JML, Bhagyaveni MA (2013) Two-way acknowledgment-based trust framework for wireless sensor networks. Int J Distrib Sens Netw Anita X, Manickam JML, Bhagyaveni MA (2013) Two-way acknowledgment-based trust framework for wireless sensor networks. Int J Distrib Sens Netw
9.
Zurück zum Zitat Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Dependable Secure Comput 3(4):386–399 Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Dependable Secure Comput 3(4):386–399
10.
Zurück zum Zitat Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. ACM Wireless Netw 15(3):279–294 Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. ACM Wireless Netw 15(3):279–294
11.
Zurück zum Zitat Bu S, Yu FR, Liu XP, Tang H (2011) Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans Wirel Commun 10(9):3064–3073 Bu S, Yu FR, Liu XP, Tang H (2011) Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans Wirel Commun 10(9):3064–3073
12.
Zurück zum Zitat Sun Y, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317 Sun Y, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317
13.
Zurück zum Zitat Khedher DB, Glitho R, Dssouli R (2007) A novel overlay-based failure detection architecture for manet applications. 2007 15th IEEE international conference on networks. IEEE Khedher DB, Glitho R, Dssouli R (2007) A novel overlay-based failure detection architecture for manet applications. 2007 15th IEEE international conference on networks. IEEE
14.
Zurück zum Zitat Cho JH, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tuts 13 Cho JH, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tuts 13
15.
Zurück zum Zitat Changiz R, Halabian H, Yu FR, Lambadaris I, Tang H (2012) Trust establishment in cooperative wireless relaying networks. Wirel Commun Mob Comput. doi:10.1002/wcm.2271 Changiz R, Halabian H, Yu FR, Lambadaris I, Tang H (2012) Trust establishment in cooperative wireless relaying networks. Wirel Commun Mob Comput. doi:10.​1002/​wcm.​2271
16.
Zurück zum Zitat Subramaniyan S, Johnson W, Subramaniyan K (2014) A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP J Wirel Commun Netw 2014(1):1–10 Subramaniyan S, Johnson W, Subramaniyan K (2014) A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP J Wirel Commun Netw 2014(1):1–10
17.
Zurück zum Zitat MacDermott Á, Shi Q, Kifayat K (2015) Collaborative intrusion detection in a federated cloud environment using the Dempster-Shafer theory of evidence. Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015. Academic Conferences Limited MacDermott Á, Shi Q, Kifayat K (2015) Collaborative intrusion detection in a federated cloud environment using the Dempster-Shafer theory of evidence. Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015. Academic Conferences Limited
18.
Zurück zum Zitat Wei Z (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. Vehicular Technology, IEEE Transactions on 63(9):4647–4658 Wei Z (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. Vehicular Technology, IEEE Transactions on 63(9):4647–4658
Metadaten
Titel
Design and Development of CTSR with Direct & Indirect Observations of MANET Applications
verfasst von
S. Sargunavathi
J. Martin Leo Manickam
Publikationsdatum
20.03.2017
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2017
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-017-0843-8

Weitere Artikel der Ausgabe 4/2017

Mobile Networks and Applications 4/2017 Zur Ausgabe

Neuer Inhalt