Skip to main content
Log in

A trust enhanced secure clustering framework for wireless ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Secure clustering in Wireless Ad Hoc Networks is a very important issue. Traditional cryptographic solution is useless against threats from internal compromised nodes. In light of this, we propose a novel distributed secure trust aware clustering protocol that provides secure solution for data delivery. A trust model is proposed that computes the trust of a node using self and recommendation evidences of its one-hop neighbors. Therefore, it is lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust. In addition, the proposed clustering protocol organizes the network into one-hop disjoint clusters and elects the most qualified, trustworthy node as a Clusterhead. This election is done by an authenticated voting scheme using parallel multiple signatures. Analysis of the protocol shows that it is more efficient and secure compared to similar existing schemes. Simulation results show that proposed protocol outperforms the popular ECS, CBRP and CBTRP in terms of throughput and packet delivery ratio with a reasonable communication overhead and latency in presence of malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Balakrishnnan, V., Varadharajan, V., Tupakula, U. K., & Lucs, P. (2007). Trust and recommendations in mobile ad hoc networks. in Proceedings of 10th IEEE international conference on networking and services (pp. 64–69).

  2. Chatterjee, P., Sengupta, I., & Ghosh, S. (2012). Stacrp: A secure trust based auction oriented clustering routing protocol for securing mobile ad hoc networks. Cluster Computing, 15, 303–320.

    Article  Google Scholar 

  3. Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.

    Google Scholar 

  4. Chatterjee, M., Das, S. K., & Turgut, D. (2000, November). An on-demand weighted clustering algorithm WCA for ad hoc networks. in Proceedings of IEEE GLOBECOM 2000 (pp. 1697–1701).

  5. Malpani, N., Welch, J., & Vaidya N. (2000, August). Leader election algorithms for mobile ad hoc networks. in Proceedings of 4th international workshop on discrete algorithms and methods for mobile computing and communications (pp. 96–103).

  6. Vasudevan, S., Decleene, B., Immerman, N., Kurose, J., & Towsley, D. (2003). Leader election algorithms for wireless ad hoc networks. in Proceedings of DARPA information survivability conference and exposition (pp. 261–272).

  7. Yu, Y., Wang, J., Song, M., & Song, J. (2010). Network traffic prediction and result analysis based on seasonal ARIMA and correlation coefficient. in Proceedings of the 2010 international conference on intelligent system design and engineering application, ISDEA’10 (Vol. 01, pp. 980–983).

  8. Stoica, P., Friedlander, B., & Soderstrom, T. (1986). Least-squares, yule-walker, and overdetermined yule-walker estimation of ar parameters: A monte carlo analys is of finite-sample properties. International Journal of Control, 43, 13–27.

    Article  MATH  Google Scholar 

  9. Akaike, H. (1974). A new look at statistical model identification. IEEE Transactions on Automatic Control, 19, 716–723.

    Article  MathSciNet  MATH  Google Scholar 

  10. Dempster, A. P. (1968). A generalization of bayesian interface. Journal of Royal Statistical Society, 30, 205–447.

    MathSciNet  MATH  Google Scholar 

  11. Shieh, S.-P., Lin, C.-T. Yang, W.-B., & Sun, H.-M. (2000). Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, 49(4), 1464–1473.

    Article  Google Scholar 

  12. Bettstetter, C., & Konig, S. (2002). On the message and time complexity of a distributed mobility-adaptive clustering algorithm in wireless ad hoc networks. in Proceeding of the 4th European wireless (pp. 128–134).

  13. Sucec, J., & Marsic, I. (2001). Hierarchical routing overhead in mobile ad hoc netorks. IEEE Transactions on Mobile Computing, 3, 45–56.

    Google Scholar 

  14. Cho, J.-H., Swami, A., & Chen, I.-R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.

    Google Scholar 

  15. Yu, J. Y., & Chong, P. H. J. (2006). An efficient clustering scheme for large and dense mobile ad hoc networks (manets). Computer Communications, 30, 5–16.

    Article  Google Scholar 

  16. Chiang, C. -C., Wu, H. -K., Liu, W., & Gerla, M. (1997, April). Routing in clustered multihop, mobile wireless networks with fading channel. in IEEE Singapore international conference on networks, SICON’97, (pp. 197–211).

  17. Safa, H., Artail, H., Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.

    Article  Google Scholar 

  18. Fall, K., & Varadhan, K. ns Manual. isi.edu/nsnam/ns/doc.

  19. Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), 1327–1342.

    Article  Google Scholar 

  20. Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.

    Google Scholar 

  21. Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04) (Vol. 26, pp. 47–54), Dunedin, New Zealand.

  22. Ghosh, T., Pissinou, N., & Makki, K. (2004, May). Collaborative trust-based routing in multi-hop ad hoc networks. in Proceedings of 3rd international IFIP-TC06 networking conference, Lecture Notes in Computer Science (pp. 1446–1451).

  23. Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trust routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10, 985–995.

    Article  Google Scholar 

  24. Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005). Quantifying trust in mobile ad hoc networks. In Proceedings of IEEE KIMAS 2005 (pp. 65–71).

  25. Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–328.

    Google Scholar 

  26. Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In Proceedings of the 5th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’08) (pp. 88–95). New York, NY: ACM.

  27. Cho, J.-H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pushpita Chatterjee.

Appendix: Proof of accuracy of the proposed trust model

Appendix: Proof of accuracy of the proposed trust model

In this section we present some important features as well as necessary and sufficient properties that a distributed trust model must possess. In addition to that we show our proposed trust model holds and satisfies all these conditions and performs well in different networking scenarios.

Claim 1

Each legitimate CH must eventually hold the replica of latest trust value of its MNs.

Proof

In our proposed scheme, each MN sends its public key to CH to join in the network at the time of initialization. Trust calculation and propagation is taken care by the CH itself and this trust information is sent periodically. Thus, the trust value of each node is periodically updated which in turn determines the reputation of the node. But due to node failure or mobility or reorganization of clusters, MNs may not get trust information of the CH. All living and legitimate CHs of the network hold the most recently updated trust information about its MNs to continue uninterrupted service. Within each cluster, CH maintains the trust table for all its MN and records all the updates accordingly. This eventually ensures propagation of correct trust information between the CHs. If any good node fails to communicate with its CH, and after some time it revives the connection, the trust value would be automatically assigned to that node from previous record.

Claim 2

Trust status of a node is uniform/same throughout the cluster and network at any particular time.

Proof

In our proposed scheme, at the time of trust generation phase each MN, GN and CH monitors the traffic of its neighbor nodes choosing some packets in a random interval of time and calculates the direct trust. CH accumulates all trust information from the neighbors of review node. Then CH combines all recommendation and finally determines the resultant trust. Therefore, CH of a cluster aggregates the trust information and finally decides and propagates the trust status throughout the network. Trust of a node is uniform throughout the network, i.e., all nodes have to trust a node by the degree decided by the CH.

Claim 3

The reputation of node can be directly acquired by the any other node without network wide flooding.

Proof

The direct trust of a node M is calculated using the local information and the local behavior monitoring of any node in the radio range. The periodic trust calculation and propagation procedure (by the CHs) ensure that the reputation of any member node can be easily detected by checking the trust table (stored in the CH). Any other member nodes while trying to communicate or get information about its neighbor (in the same cluster) or any other nodes in the network, it has to query to the associated CH only. This makes the distributed trust computation procedure flexible and efficient and thus completes the proof.

Claim 4

A node’s locally stored trust value is readable to the CH but confidential to any node including the node itself.

Proof

Our scheme holds this property. This is one of the important security measures. Any node cannot have access on its own trust value. After the final calculation of resultant trust CH securely propagates the Trust_Cert and Available-Neighbor list to its MNs digitally signing the message. The trust value is stored in CH only. So there is no way for any malicious node to advertise itself as trusted and disrupt the network functionality.

Claim 5

A node’s unauthorized modification to its local trust and reputation information can be identified and prevented.

Proof

This claim can be corroborated using Claim 4. A malicious node cannot join to two different clusters simultaneously. A node is permitted to join not more than one CH at a time. Suppose, a node tries to join in two clusters simultaneously, then it would get two different IP and ID from two different CHs. If this type of maliciousness cannot be detected, secret information may easily be leaked between two clusters. Our protocol guarantees detection of such malicious activity. If any GW finds a node initiates different communications with different ID or IP address, GW reports to the CH about the malicious node and subsequently the node is removed. If such node exists, GW detects, and block this node; restores previous local trust value. Thus the unauthorized modification to local trust and reputation are identified and can be prevented.

Claim 6

The model ensures better accuracy in trust calculation and its secure propagation.

Proof

The proposed model does not rely only on the local monitoring method or observation of any individual node. Firstly, direct trust of a node N, is calculated by all neighboring nodes depending on the behavior of N. Here, the behaviors (both good and bad) of N is parameterized by some metrics and corresponding weight. Once, direct trust are calculated by each neighboring node, these trust values are combined (based on appropriate weights) to formulate the resultant trust values using the weighted DS-theory presented in the Eq. 2. The uniqueness/major strength of this weighted trust calculation scheme is in combining the evidences from different nodes with uneven (unequal) priority distribution. Thus neighboring nodes of N modify the trust values depending on weights, which are again computed depending on environment parameters. This ensures more accuracy in the proposed trust calculation scheme. On the other hand, after final trust calculation for the member nodes of any cluster, only a digitally signed trust certificate is propagated. Thus, the proof completes.

Claim 7

Weight based trust calculation scheme ensures lower impact by malicious node on trust calculation.

Proof

In the proposed protocol, Clusterhead (CH) calculates direct trust of a node by directly monitoring the node. Subsequently it collects the trust evidences (i.e., Recommendation Trusts) from different neighbor nodes of the node under review. Finally, in order to calculate the resultant trust of the node under review, CH combines its direct trust and all the recommendation trusts using proposed DS-theory of combining evidences. In traditional DS-theory of combination, as all beliefs are given equal priority, the impact of recommendation from a malicious node which reports its belief about another node under review may be higher. As a result of this, a good node may be treated as bad one. However in our proposed proposal, we have eliminated such ambiguity. Here may be two cases: in the first case, a node is already detected as malicious (blacklisted) and in the second case, the node behaves maliciously but not marked as blacklisted. In the first case, the proposed protocol does not consider the recommendation from malicious nodes while CH combines the trust evidences. In the second case, the proposed weight-based DS-theory assigns weight to the evidences from different nodes before combining them. This weight is determined by the past behavior of the recommender node depending with environment parameters. The highest weight (say 50 %) is assigned to the belief generated by the CH itself to quarantine the impact of the malicious node. If the recommender node has higher trust value, it is less likely to report with wrong recommendation. So, our trust calculation scheme guarantees lower impact of evidence by any malicious node on the final trust of a node under review.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chatterjee, P., Ghosh, U., Sengupta, I. et al. A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Netw 20, 1669–1684 (2014). https://doi.org/10.1007/s11276-014-0701-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0701-6

Keywords

Navigation