Skip to main content
Log in

Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide authentication, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are not viable for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized and localized public key authentication mechanism based on ant colony systems. Every node generates its own public-private key pair, issues certificates to neighboring nodes and provides on-demand authentication services by means of gathering certificate chains towards a target node. Pheromone concentration left by ants along the path of the certificate chains represents the trust level of a node towards other nodes. This model is able to authenticate public keys by selecting the most trustworthy certificate chains gathered by ants and can identify and exclude certificate chains with malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Hashmi S, Brooke J (2008) Authentication mechanisms for mobile ad-hoc networks and resistance to sybil attack. Proc Second Int Conf Emerg Secur Inf Syst Technol IEEE Comput Soc

  2. Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556

    Article  Google Scholar 

  3. Cordon O, Herrera F, Stützle T (2002) A review on the ant colony optimization metaheuristic: basis, models and new trends. Math Soft Comput

  4. Zimmermann P (1995) The official pgp user’s guide. MIT Press

  5. Capkun S, Buttyan L, Hubaux J-P (2003) Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mob Comput 52–64

  6. Li R, Li J, Liu P, Chen H (2006) On-demand public-key management for mobile ad hoc networks: research articles. Wirel Commun Mob Comput 6:295–306

    Article  Google Scholar 

  7. Dahshan H, Irvine J (2010) A robust self-organized public key management for mobile ad hoc networks. Secur Commun Netw 16–30

  8. Dahshan H, Irvine J (2009) On demand self-organized public key management for mobile ad hoc networks. IEEE 69th Vehicular Technology Conferece

  9. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 618–644

  10. Marti S, Garciamolina H (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 472–484

  11. Kamvar S, Schlosser M, Garcia-Molina H (2003) The Eigentrust Algorithm for Reputation Management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW ‘03). Budapest, Hungary: ACM

  12. Mármol FG, Pérez GM, Skarmeta AFG (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 1:153–164

    Article  Google Scholar 

  13. Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems

  14. Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security 107–121

  15. Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM: Washington DC, USA 66–77

  16. Boukerch A, Xu L, Khatib E (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(p):2413–2427

    Article  Google Scholar 

  17. Wang W, Zeng G, Yuan L (2006) Ant-based reputation evidence distribution in P2P networks. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing. IEEE Comp Soc 129–132

  18. Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. IEEE Comput Soc 7:588–593

  19. Jøsang A, Golbeck J (2009) Challenges for robust of trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, Saint Malo, France

  20. Douceur JR (2002) The sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems. Springer-Verlag 251–260

  21. MathWorks: http://www.mathworks.com/products/matlab/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parisa Memarmoshrefi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memarmoshrefi, P., Seibel, R. & Hogrefe, D. Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks. Mobile Netw Appl 21, 149–160 (2016). https://doi.org/10.1007/s11036-016-0703-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-016-0703-y

Keywords

Navigation