Skip to main content

Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

  • 1197 Accesses

Abstract

Mobile Ad Hoc Networks (MANETs) suffer from acute crisis of resources in terms of battery power, computational ability, and so on. This together with its inherent salient nature makes it very difficult to design effective and efficient security solutions for the MANET. In this kind of dynamic environment, the nodes cannot rely on the conventional measures pertaining to the wired networks. Thus, approaches that depend on trust establishment and evaluation among the nodes are being considered as significant strides toward data protection, secure routing, and other secure network activities. Most of these models can be deemed as rather unscalable due to an excessive exhaustion of resources. In this paper, we limit the region of concern for each node to its one-hop locality and thereby considerably reduce the network overhead. This simple approach to security depending on the principle of mutual trust and prioritization of self-experience has been shown to be effective against a pool of common attacks and feasible with respect to the architectural demand of MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biswas, K., Ali, M.L.: Security threats in mobile ad hoc network. M.Sc. Thesis, BTH, Sweden (2007)

    Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  3. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. Proceedings of MobiCom 2000, 6th Annual International Conference on Mobile Computing and Networking, Boston, USA, 6–11 Aug 2000

    Google Scholar 

  4. Pietro, R.D., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, pp. 66–73, Oct 2002

    Google Scholar 

  5. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.: On communication security in wireless ad-hoc sensor networks. In: Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02), pp. 139–144, June 2002

    Google Scholar 

  6. Cr’epeau, C., Davis, C.R.: A certificate revocation scheme for wireless ad hoc networks. In: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Oct 2003

    Google Scholar 

  7. Housley, R., Polk, W., Ford, W., Solo, D.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. Internet Request for Comments (RFC 3280), Apr 2002

    Google Scholar 

  8. Davis, C.R.: A Localized Trust Management Scheme for Ad hoc Networks. McGill University, Montreal (2009)

    Google Scholar 

  9. Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. Technical Report, Nokia Research Center, Helsinki, Finland, Oct 2003

    Google Scholar 

  10. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of Australasian Computer Science Conference, pp. 47–54, Jan 2004

    Google Scholar 

  11. Marsh, S.P.: Formalizing trust as a computational concept. Ph.D. Thesis, Department of Mathematics and Computer Science, University of Stirling (1994)

    Google Scholar 

  12. Sarela, M., Hietalahti, M.: Security topics and mobility management in hierarchical ad hoc networks: A literature survey, interim report of project samoyed. Helsinki University of Technology, Apr 2004

    Google Scholar 

  13. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)

    Google Scholar 

  14. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proceedings of the 9th International Conference on Network Protocols (ICNP), pp. 251–260, Nov 2001

    Google Scholar 

  15. Kong, J., Luo, H., Xu, K., Gu, D.L., Gerla, M., Lu, S.: Adaptive security for multi-layer ad-hoc networks. In: Special Issue of Wireless Communications and Mobile Computing. Wiley, Aug 2002

    Google Scholar 

  16. Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks. In: Proceedings of 7th IEEE Symposium on Computers and Communications (ISCC’02), July 2002

    Google Scholar 

  17. Zhou, L., Schneider, F.B., van Renesse, R.: Coca: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4), 329–368 (2002)

    Article  Google Scholar 

  18. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. IEEE ISCC 2002

    Google Scholar 

  19. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  20. Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27(4), 465–468 (2005)

    Google Scholar 

  21. Ngai, E.C.H., Lyu, M.R.: Trust and clustering-based authentication services in mobile ad hoc networks. In: Proceedings of 24th International Conference on Distributed Computing Systems Workshops—W4: MDC (ICDCSW’04), Hong Kong, China, pp. 582–587 (2004)

    Google Scholar 

  22. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)

    Google Scholar 

  23. Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps security in ad hoc networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003), June 2003

    Google Scholar 

  24. Eschenauer, V.D.G.L., Baras, J.: On trust establishment in mobile ad-hoc networks. In: Proceedings of 10th International Workshop of Security Protocols, Springer Lecture Notes in Computer Science (LNCS), Apr 2002

    Google Scholar 

  25. Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), pp. 146–155, Oct 2001

    Google Scholar 

  26. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. ACM MOBICOM (2000)

    Google Scholar 

  27. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. ACM MOBICOM (2000)

    Google Scholar 

  28. Yang, H., Zhong, G., Lu S.: Network performance centric security design in MANET. IEEE Mob. Comput. Commun. Rev. 6, 50 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. M. Imtiaz-Ud-Din .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Imtiaz-Ud-Din, K.M., Bhuiyan, T., Ripon, S. (2014). Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_15

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics