Skip to main content

2017 | OriginalPaper | Buchkapitel

STCM: Secured Trust-Based Communication Method in Vulnerable Mobile Adhoc Network

verfasst von : Burhan UI Islam Khan, Rashidah F. Olanrewaju, Asifa Mehraj Baba, Nurul Fariza Zulkarnain, Sajad Ahmad Lone

Erschienen in: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequently used technique to ensure security in communication of mobile Adhoc network; however, there are associated issues with cryptographic implementation in security. Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. The proposed system applies a novel design of control message that uses simple tree to maintain certificates and performs authentication of nodes based on trust factor of node with respect to identity and behavioral pattern of the mobile nodes. The outcome of the study shows better security and communication performance in comparison to frequently used routing approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Basagni S, Conti M, Giordano S, Stojmenovic I (2013) Mobile Ad Hoc networking: the cutting edge directions, vol 35. Wiley (2013) Basagni S, Conti M, Giordano S, Stojmenovic I (2013) Mobile Ad Hoc networking: the cutting edge directions, vol 35. Wiley (2013)
2.
Zurück zum Zitat Cuesta CE, Romay MP (2010) Elements of self-adaptive system-a decentralized architectural perspective. In: Weyns D, Malek S, Lemos R, Andersson J (eds) Self-organizing architectures, LNCS, vol 6090. Springer, Berlin Heidelberg, pp 1–20CrossRef Cuesta CE, Romay MP (2010) Elements of self-adaptive system-a decentralized architectural perspective. In: Weyns D, Malek S, Lemos R, Andersson J (eds) Self-organizing architectures, LNCS, vol 6090. Springer, Berlin Heidelberg, pp 1–20CrossRef
3.
Zurück zum Zitat Rekik JD, Baccouche L, Ghezella HB (2011) An energy and delay-aware routing protocol for mobile Adhoc network. In: Ozcan A, Zizka J, Nagamalai D (eds) Recent trends in wireless and mobile networks, CCIS, vol 162. Springer, Berlin Heidelberg, pp 123–134CrossRef Rekik JD, Baccouche L, Ghezella HB (2011) An energy and delay-aware routing protocol for mobile Adhoc network. In: Ozcan A, Zizka J, Nagamalai D (eds) Recent trends in wireless and mobile networks, CCIS, vol 162. Springer, Berlin Heidelberg, pp 123–134CrossRef
4.
Zurück zum Zitat Guirgui1 SK, Saaid OS (2012) Evaluating the performance of secure routing protocols in mobile Ad-hoc networks. IJARCCE 1(9) Guirgui1 SK, Saaid OS (2012) Evaluating the performance of secure routing protocols in mobile Ad-hoc networks. IJARCCE 1(9)
6.
Zurück zum Zitat Raghavendran CHV, Satish GN, Varma PS (2013) Security challenges and attacks in Mobile Ad Hoc networks. IJIEEB 5(3):49–58CrossRef Raghavendran CHV, Satish GN, Varma PS (2013) Security challenges and attacks in Mobile Ad Hoc networks. IJIEEB 5(3):49–58CrossRef
7.
Zurück zum Zitat Pal DK, Goel PM (2014) Survey on security issues in mobile Ad Hoc networks. IJCSIT 5(3):3732–3735 Pal DK, Goel PM (2014) Survey on security issues in mobile Ad Hoc networks. IJCSIT 5(3):3732–3735
8.
Zurück zum Zitat Zamani AT, Zubair S (2014) Key management scheme in mobile Ad Hoc networks. IJERMT 3(4). ISSN:2278-9359 Zamani AT, Zubair S (2014) Key management scheme in mobile Ad Hoc networks. IJERMT 3(4). ISSN:2278-9359
9.
Zurück zum Zitat Sadamate SS, Nandedkar VS (2013) Review paper on calculation, distribution of trust & reputation in MANET, IJSME 1(6) Sadamate SS, Nandedkar VS (2013) Review paper on calculation, distribution of trust & reputation in MANET, IJSME 1(6)
10.
Zurück zum Zitat Khan BUI, Olanrewaju RF, Habaebi MH (2013) Malicious behavior of node and its significant security techniques in MANET—A review. AJBAS 7(12):286–293 Khan BUI, Olanrewaju RF, Habaebi MH (2013) Malicious behavior of node and its significant security techniques in MANET—A review. AJBAS 7(12):286–293
11.
Zurück zum Zitat Askoxylakis IG, Tryfonas T, May J, Siris V (2011) A family of key agreement mechanisms for mission critical communications for secure mobile Ad Hoc and wireless mesh internetworking. EURASIP J Wireless Commun Netw 13 Askoxylakis IG, Tryfonas T, May J, Siris V (2011) A family of key agreement mechanisms for mission critical communications for secure mobile Ad Hoc and wireless mesh internetworking. EURASIP J Wireless Commun Netw 13
12.
Zurück zum Zitat Li W, Joshi A, Finin T (2011) SMART: an SVM-based misbehavior detection and trust management framework for mobile Ad hoc networks. IEEE-Military Commun, 1102–1109 Li W, Joshi A, Finin T (2011) SMART: an SVM-based misbehavior detection and trust management framework for mobile Ad hoc networks. IEEE-Military Commun, 1102–1109
13.
Zurück zum Zitat Akbani R, Korkmaz T (2011) Enhancing role-based trust management with a reputation system for MANETs. EURASIP J Wireless Commun Netw 90 Akbani R, Korkmaz T (2011) Enhancing role-based trust management with a reputation system for MANETs. EURASIP J Wireless Commun Netw 90
14.
Zurück zum Zitat Campos J, Calafate CT, Nacher M (2011) HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J Wirel Commun Netw 3 Campos J, Calafate CT, Nacher M (2011) HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J Wirel Commun Netw 3
15.
Zurück zum Zitat Huang Z, Ruj S, Cavenaghi M, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw and Appl 7(3):229–242CrossRef Huang Z, Ruj S, Cavenaghi M, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw and Appl 7(3):229–242CrossRef
16.
Zurück zum Zitat Shikfa A, Onen M, Molva R (2012) Local key management in opportunistic networks. IJCNDS 9(1–2):97–116CrossRef Shikfa A, Onen M, Molva R (2012) Local key management in opportunistic networks. IJCNDS 9(1–2):97–116CrossRef
17.
Zurück zum Zitat Monisha JH, Uthariaraj R (2012) Diagnosing MAC misbehavior in mobile Ad Hoc networks using statistical methods. IJCSNS 12(5) Monisha JH, Uthariaraj R (2012) Diagnosing MAC misbehavior in mobile Ad Hoc networks using statistical methods. IJCSNS 12(5)
18.
Zurück zum Zitat Cho JH, Chan KS, Chen R (2013) Composite trust-based public key management in mobile Ad Hoc networks. In: Proceedings of the 28th Annual ACM symposium on applied computing, pp 1949–1956 Cho JH, Chan KS, Chen R (2013) Composite trust-based public key management in mobile Ad Hoc networks. In: Proceedings of the 28th Annual ACM symposium on applied computing, pp 1949–1956
19.
Zurück zum Zitat Abidin AFA, Kolberg M (2013) Establishing trust in VANETs using information from social networks. In: Postgraduate network symposium (PGNet), pp 20–25 Abidin AFA, Kolberg M (2013) Establishing trust in VANETs using information from social networks. In: Postgraduate network symposium (PGNet), pp 20–25
20.
Zurück zum Zitat Kumar AV, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J Kumar AV, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J
21.
Zurück zum Zitat Chen R, Guo J, Bao F, Cho JH (2014) Trust management in mobile Ad Hoc networks for bias minimization and application performance maximization. Elsevier-Ad Hoc Netw 19:59–74CrossRef Chen R, Guo J, Bao F, Cho JH (2014) Trust management in mobile Ad Hoc networks for bias minimization and application performance maximization. Elsevier-Ad Hoc Netw 19:59–74CrossRef
22.
Zurück zum Zitat Menaka A, Pushpa ME (2009) Trust based secure routing in AODV routing protocol. In: Proceedings of the 3rd IEEE International conference on internet multimedia services architecture and applications, pp 1–6 Menaka A, Pushpa ME (2009) Trust based secure routing in AODV routing protocol. In: Proceedings of the 3rd IEEE International conference on internet multimedia services architecture and applications, pp 1–6
Metadaten
Titel
STCM: Secured Trust-Based Communication Method in Vulnerable Mobile Adhoc Network
verfasst von
Burhan UI Islam Khan
Rashidah F. Olanrewaju
Asifa Mehraj Baba
Nurul Fariza Zulkarnain
Sajad Ahmad Lone
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1721-6_17

Neuer Inhalt