Abstract
Mobile Ad Hoc Networks (MANETs) suffer from acute crisis of resources in terms of battery power, computational ability, and so on. This together with its inherent salient nature makes it very difficult to design effective and efficient security solutions for the MANET. In this kind of dynamic environment, the nodes cannot rely on the conventional measures pertaining to the wired networks. Thus, approaches that depend on trust establishment and evaluation among the nodes are being considered as significant strides toward data protection, secure routing, and other secure network activities. Most of these models can be deemed as rather unscalable due to an excessive exhaustion of resources. In this paper, we limit the region of concern for each node to its one-hop locality and thereby considerably reduce the network overhead. This simple approach to security depending on the principle of mutual trust and prioritization of self-experience has been shown to be effective against a pool of common attacks and feasible with respect to the architectural demand of MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biswas, K., Ali, M.L.: Security threats in mobile ad hoc network. M.Sc. Thesis, BTH, Sweden (2007)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. Proceedings of MobiCom 2000, 6th Annual International Conference on Mobile Computing and Networking, Boston, USA, 6–11 Aug 2000
Pietro, R.D., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, pp. 66–73, Oct 2002
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.: On communication security in wireless ad-hoc sensor networks. In: Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02), pp. 139–144, June 2002
Cr’epeau, C., Davis, C.R.: A certificate revocation scheme for wireless ad hoc networks. In: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Oct 2003
Housley, R., Polk, W., Ford, W., Solo, D.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. Internet Request for Comments (RFC 3280), Apr 2002
Davis, C.R.: A Localized Trust Management Scheme for Ad hoc Networks. McGill University, Montreal (2009)
Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. Technical Report, Nokia Research Center, Helsinki, Finland, Oct 2003
Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of Australasian Computer Science Conference, pp. 47–54, Jan 2004
Marsh, S.P.: Formalizing trust as a computational concept. Ph.D. Thesis, Department of Mathematics and Computer Science, University of Stirling (1994)
Sarela, M., Hietalahti, M.: Security topics and mobility management in hierarchical ad hoc networks: A literature survey, interim report of project samoyed. Helsinki University of Technology, Apr 2004
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proceedings of the 9th International Conference on Network Protocols (ICNP), pp. 251–260, Nov 2001
Kong, J., Luo, H., Xu, K., Gu, D.L., Gerla, M., Lu, S.: Adaptive security for multi-layer ad-hoc networks. In: Special Issue of Wireless Communications and Mobile Computing. Wiley, Aug 2002
Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks. In: Proceedings of 7th IEEE Symposium on Computers and Communications (ISCC’02), July 2002
Zhou, L., Schneider, F.B., van Renesse, R.: Coca: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4), 329–368 (2002)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. IEEE ISCC 2002
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27(4), 465–468 (2005)
Ngai, E.C.H., Lyu, M.R.: Trust and clustering-based authentication services in mobile ad hoc networks. In: Proceedings of 24th International Conference on Distributed Computing Systems Workshops—W4: MDC (ICDCSW’04), Hong Kong, China, pp. 582–587 (2004)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)
Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps security in ad hoc networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003), June 2003
Eschenauer, V.D.G.L., Baras, J.: On trust establishment in mobile ad-hoc networks. In: Proceedings of 10th International Workshop of Security Protocols, Springer Lecture Notes in Computer Science (LNCS), Apr 2002
Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), pp. 146–155, Oct 2001
Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. ACM MOBICOM (2000)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. ACM MOBICOM (2000)
Yang, H., Zhong, G., Lu S.: Network performance centric security design in MANET. IEEE Mob. Comput. Commun. Rev. 6, 50 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Imtiaz-Ud-Din, K.M., Bhuiyan, T., Ripon, S. (2014). Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_15
Download citation
DOI: https://doi.org/10.1007/978-81-322-1665-0_15
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1664-3
Online ISBN: 978-81-322-1665-0
eBook Packages: EngineeringEngineering (R0)