Abstract
The proliferation in installation of mobile ad hoc networks (MANET) in different fields of application demands attention in enforcement of trust-based security access control. The decentralized and mobile characteristics of MANET, restrains the traditional access control mechanisms to fit into it. In a MANEt, all peers or nodes are not equally trustworthy to request for a service or to transmit a packet. In decentralized system, concept of social trust has been introduced to compute how trustworthy the peer is. A number of trust models have been proposed by the researchers in the past decade, but still exists a lack of proper integration of trust-based access control with mission-critical MANET. In this paper, we propose an access control framework equipped with cognitive trust-based model. The framework integrates aspect of cognition based trust and reputation model, certification based participation schemes and an overall security access control mechanism for MANET nodes. We argue our proposed scheme is realistic and our approach preserves network properties of mobile ad hoc networks and individual characteristics of the nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE (2002)
Balachandran, R.K., Ramamurthy, B., Zou, X., Vinodchandran, N.V.: CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: 2005 IEEE International Conference on Communications, ICC 2005, vol. 2, pp. 1123–1127. IEEE (2005)
Maity, S., Bera, P., Ghosh, S.K.: An access control framework for semi-infrastructured Ad hoc networks. In: 2010 2nd International Conference on Computer Technology and Development, ICCTD, pp. 708–712. IEEE (2010)
Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, p. 54. Australian Computer Society, Inc. (2004)
Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for p2p file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS 2005, p. 302c. IEEE (2005)
Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 1–18. Springer, Heidelberg (1994)
Li, X., Jia, Z., Zhang, P., Wang, H.: A trust-based multipath routing framework for Mobile Ad hoc NETworks. In: 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery, FSKD, vol. 2, pp. 773–777. IEEE (2010)
Zhang, C., Zhu, X., Song, Y., Fang, Y.: A formal study of trust-based routing in wireless ad hoc networks. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)
Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems, KIMAS 2005. Citeseer (2005)
Li, W., Joshi, A.: Security Issues in Mobile Ad Hoc Networks-A Survey (2008)
Kärpijoki, V.: Security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, Seminar on Network Security. Citeseer (2000)
International Standards for Standardization. ISO 7498-2:1989 (2000), http://www.iso.org/iso/catalogue_detail.htm?csnumber=14256
Gordon, R.L.: Trust establishment in mobile ad hoc networks (2008)
Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM (2004)
Alicherry, M., Keromytis, A.D., Stavrou, A.: Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 41–50. Springer, Heidelberg (2009)
Alicherry, M., Keromytis, A.D.: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. In: International Conference on Network and System Security. Citeseer (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maity, S., Ghosh, S.K. (2012). A Cognitive Trust Model for Access Control Framework in MANET. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)