Abstract
In this paper we present a distributed self-organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured in an efficient manner and from broader perspectives including direct interactions with neighbors, observing interactions of neighbors and through recommendations. Our prediction scheme uses a trust evaluation algorithm at each node to calculate the direct trust rating normalized as a fuzzy value between zero and one. The evidence theory of Dempster-Shafer [9], [10] is used in order to combine the evidences collected by a clusterhead itself and the recommendations from other neighbor nodes. Moreover, in our scheme we do not restrict to a single gateway node for inter cluster routing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vardhanrajan, et al.: Security for cluster based ad hoc networks. In: Proc. of Computer Communications, vol. 27, pp. 488–501 (2004)
Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 424–435. Springer, Heidelberg (2006)
Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A Cluster-Based Security Architecture for Ad Hoc Networks. In: INFOCOM 2004 (2004)
Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 146–155 (2001)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6) (1999)
Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly Associates, Inc., Sebastopol (1995)
Pirzada, A.A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Estivill-Castro, V. (ed.) Proc. Twenty-Seventh Australasian Computer Science Conference (ACSC 2004), Dunedin, New Zealand. CRPIT, vol. 26, pp. 47–54. ACS (2004)
Rahman, A.A., Hailes, S.: A Distributed Trust Model. In: Proc. of the ACM New Security Paradigms Workshop, pp. 48–60 (1997)
Dempster, A.P.: A generalization of Bayesian interface. Journal of Royal Statistical Society 30, 205–447 (1968)
Shafer, G.: A Mathematical theory of Evidence. Princeton University Press, Princeton (1976)
Dekar, L., Kheddouci, H.: A cluster based mobility prediction scheme for ad hoc networks. Ad Hoc Networks 6(2), 168–194 (2008)
Chatterjee, M., Das, S.K., Turgut, D.: An on-demand weighted clustering algorithm (WCA) for ad hoc networks. In: Proc. of IEEE GLOBECOM 2000, San Francisco, pp. 1697–1701 (November 2000)
Basagni, S.: Distributed clustering for ad hoc networks. In: Proc. of International Symposium on Parallel Architectures, Algorithms and Networks, pp. 310–315 (June 1999)
Virendra, et al.: Quantifying trust in Mobile ad hoc networks. In: Proc. of KIMAS 2005, Waltham USA, April 18-21 (2005)
Malpani, N., Welch, J., Vaidya, N.: Leader Election Algorithms for Mobile Ad Hoc Networks. In: Fourth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Boston, MA (August 2000)
Vasudevan, S., Decleene, B., Immerman, N., Kurose, J., Towsley, D.: Leader Election Algorithms for Wireless Ad Hoc Networks. In: Proceedings of DARPA Information Survivability Conference and Exposition (2003)
NS-2: The Network Simulator, UC Berkeley, http://www.isi.edu/nsnam/ns/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chatterjee, P., Sengupta, I., Ghosh, S.K. (2009). A Trust Based Clustering Framework for Securing Ad Hoc Networks. In: Prasad, S.K., Routray, S., Khurana, R., Sahni, S. (eds) Information Systems, Technology and Management. ICISTM 2009. Communications in Computer and Information Science, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00405-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-00405-6_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00404-9
Online ISBN: 978-3-642-00405-6
eBook Packages: Computer ScienceComputer Science (R0)