Skip to main content

A Cognitive Trust Model for Access Control Framework in MANET

  • Conference paper
Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

Abstract

The proliferation in installation of mobile ad hoc networks (MANET) in different fields of application demands attention in enforcement of trust-based security access control. The decentralized and mobile characteristics of MANET, restrains the traditional access control mechanisms to fit into it. In a MANEt, all peers or nodes are not equally trustworthy to request for a service or to transmit a packet. In decentralized system, concept of social trust has been introduced to compute how trustworthy the peer is. A number of trust models have been proposed by the researchers in the past decade, but still exists a lack of proper integration of trust-based access control with mission-critical MANET. In this paper, we propose an access control framework equipped with cognitive trust-based model. The framework integrates aspect of cognition based trust and reputation model, certification based participation schemes and an overall security access control mechanism for MANET nodes. We argue our proposed scheme is realistic and our approach preserves network properties of mobile ad hoc networks and individual characteristics of the nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE (2002)

    Google Scholar 

  2. Balachandran, R.K., Ramamurthy, B., Zou, X., Vinodchandran, N.V.: CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: 2005 IEEE International Conference on Communications, ICC 2005, vol. 2, pp. 1123–1127. IEEE (2005)

    Google Scholar 

  3. Maity, S., Bera, P., Ghosh, S.K.: An access control framework for semi-infrastructured Ad hoc networks. In: 2010 2nd International Conference on Computer Technology and Development, ICCTD, pp. 708–712. IEEE (2010)

    Google Scholar 

  4. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, p. 54. Australian Computer Society, Inc. (2004)

    Google Scholar 

  5. Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for p2p file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS 2005, p. 302c. IEEE (2005)

    Google Scholar 

  6. Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 1–18. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  7. Li, X., Jia, Z., Zhang, P., Wang, H.: A trust-based multipath routing framework for Mobile Ad hoc NETworks. In: 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery, FSKD, vol. 2, pp. 773–777. IEEE (2010)

    Google Scholar 

  8. Zhang, C., Zhu, X., Song, Y., Fang, Y.: A formal study of trust-based routing in wireless ad hoc networks. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)

    Google Scholar 

  9. Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems, KIMAS 2005. Citeseer (2005)

    Google Scholar 

  10. Li, W., Joshi, A.: Security Issues in Mobile Ad Hoc Networks-A Survey (2008)

    Google Scholar 

  11. Kärpijoki, V.: Security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, Seminar on Network Security. Citeseer (2000)

    Google Scholar 

  12. International Standards for Standardization. ISO 7498-2:1989 (2000), http://www.iso.org/iso/catalogue_detail.htm?csnumber=14256

  13. Gordon, R.L.: Trust establishment in mobile ad hoc networks (2008)

    Google Scholar 

  14. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM (2004)

    Google Scholar 

  15. Alicherry, M., Keromytis, A.D., Stavrou, A.: Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 41–50. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Alicherry, M., Keromytis, A.D.: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. In: International Conference on Network and System Security. Citeseer (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maity, S., Ghosh, S.K. (2012). A Cognitive Trust Model for Access Control Framework in MANET. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics