Skip to main content
Log in

Secure Access Control Guarding Against Internal Attacks in Distributed Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we propose a secure and efficient trust scheme with Bayesian theory to detect whether a node is malicious or not. In order to improve the correctness of detecting behavior, we aim to consider the influence with respect to the internal attacks of compromised nodes as many as possible. Moreover, the information of malicious behaviors is collected by their neighboring nodes and fused by the foregoing hop nodes. And then, the trust value concerning some node is computed by its father node in a route. Moreover, the key exchange of a secure route is implemented by the modified Diffie–Hellman key agreement protocol to guard against man-in-the-middle attack. The simulation results show that, with the increase of trust ratio, the Bayesian theorem can make more credible judgment on whether the network nodes are secure than the Beta function and the efficient clustering scheme for group key management in the present of malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Baras J. S. (2007) Security and trust for wireless autonomic networks systems and control methods. European Journal of Control 13(2–3): 105–133

    Article  Google Scholar 

  2. Zouridaki C., Mark B. L., Hejmo M., Thomas R. K. (2007) Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security 15(1): 3–38

    Google Scholar 

  3. Drira K., Seba H., Kheddouci H. (2010) ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications 33(9): 1094–1107

    Article  Google Scholar 

  4. Ayday E., Fekri F. (2010) A protocol for data availability in mobile ad-hoc networks in the presence of in sider attack. Ad Hoc Networks 8(2): 181–192

    Article  Google Scholar 

  5. Mohi, M., Movaghar, A., & Zadeh, P. M. (2009, January). A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In International conference on communications and mobile computing (CMC). Kunming, Yunnan, China.

  6. Tian, L., & Lin, C. (2010). Computation and analysis of node intending trust in WSNs. In 2010 IEEE international conference on wireless communications. Beijing: Networking and Information Security (WCNIS). June 2010.

  7. Lin, Y., & Li, M. (2009). Distributed detection of jamming and defense in wireless sensor networks. In 43rd annual conference on information sciences and systems (CISS). USA: Baltimore, March 2009.

  8. Chen K. C., Chen P. Y., Prasad N., Liang Y. C., Sun S. (2010) Trusted cognitive radio networking. Wireless Communications and Mobile Computing 10(4): 467–485

    Google Scholar 

  9. Akyildiz I. F., Lee W. Y., Chowdhury K. R. (2009) CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Networks 7(5): 810–836

    Article  Google Scholar 

  10. Mishra A. (2008) Security and quality of service in ad hoc wireless networks. Cambridge University Press, Cambridge

    Book  Google Scholar 

  11. Mahmoud Q. (2007) Cognitive networks: Towards self-aware networks. Wiley, New York, NY

    Book  Google Scholar 

  12. Beghriche, Y., Toubiana, V., & Labiod, H. (2008). A Bayesian filter to detect misbehaving nodes in MANETs. In New technologies, mobility and security conference and Workshops (NTMS). Tangier, Morocco, November 2008.

  13. Begriche, Y., & Labiod, H. (2009). A Bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol. In 7th international conference on information, communications and signal processing (ICICS). Macau Fisherman’s Wharf, China, December 2009.

  14. Yang, L., Kizza, J. M., Cemerlic, A., & Liu, F. (2007). Fine-grained reputation-based routing in wireless ad hoc networks. In IEEE intelligence and security informatics. New Brunswick, NJ, May 2007.

  15. Burmester, M., & Van Le, T. (2004). Secure communications in ad hoc networks. In 5th annual IEEE system, man and cybernetics information assurance workshop (SMC). West Point, NY, June 2004.

  16. Burmester, M., & Van Le, T. (2004). Secure multipath communication in mobile ad hoc networks. In International conference on information technology: Coding computing (ITCC). Las Vegas, NV, April 2004

  17. Ayday, E., & Fekri, F. (2008). Using node accountability in credential based routing for mobile ad-hoc networks. In 5th IEEE international conference on mobile ad-hoc and sensor systems (MASS). Atlanta, GA, September 2008.

  18. Hu, N., Zhu, P., & Zou, P. (2009). An alliance based reputation model for internet autonomous system trust evaluation. In IEEE international symposium on parallel and distributed processing with applications (ISPA). Chengdu, Sichuan, China, August 2009.

  19. Lee, M., Ye, X., Johnson, S., Marconett, D., Vsk, C., Vemuri, R., & Yoo, S. J. B. (2009). Cognitive security management with reputation based cooperation schemes in heterogeneous networks. In IEEE symposium on computational intelligence in cyber security (CICS). Nashville, TN, March 2009.

  20. Wrona K., Hallingstad G. (2010) Real-time automated risk assessment in protected core networking. Telecommunication Systems 45(2–3): 205–214

    Article  Google Scholar 

  21. Bose, S., Bharathimurugan, S., & Kannan, A. (2007). Multi-layer integrated anomaly intrusion detection system for mobile ad hoc networks. In International conference on signal processing, communications and networking (ICSCN). Chennai, India, Febrary 2007.

  22. Ding, J., Xu, S., Kramer, B., Bai, Y., Chen, H., & Zhang, J. (2004). Probabilistic inference strategy in distibuted intrusion detection systems. In International symposium on parallel and distributed processing and applications. Hong Kong, China, December 2004.

  23. Djenouri D., Badache N. (2008) Struggling against selfishness and black hole attacks in MANETs. Wireless Communications Mobile Computing 8(6): 689–704

    Article  Google Scholar 

  24. Yang L., Cemerlic A., Cui X. (2010) A Dirichlet reputation system in reliable routing of wireless ad hoc network. Security and Communication Networks 3(2–3): 250–260

    Article  Google Scholar 

  25. Berger J. O. (1985) Statistical decision theory and Bayesian analysis. Springer, New York, NY

    Book  MATH  Google Scholar 

  26. Guo, J., Zhou, X., Miao, X., & Zhang, Z. (2011). Secure minimum-energy multicast tree based on trust mechanism for cognitive radio networks. Wireless Personal Communications. doi:10.1007/s11277-011-0390-8.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiwen Guo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, J., Zhou, X., Yuan, J. et al. Secure Access Control Guarding Against Internal Attacks in Distributed Networks. Wireless Pers Commun 68, 1595–1609 (2013). https://doi.org/10.1007/s11277-012-0541-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0541-6

Keywords

Navigation