Skip to main content

Establishing Trust between Nodes in Mobile Ad-Hoc Networks

  • Conference paper
Trusted Systems (INTRUST 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7711))

Included in the following conference series:

Abstract

Civil protection organizations like firefighters or police rely on mobile personnel capable of solving tasks in exceptional scenarios. Wireless mobile and ad-hoc communication equipment can be used to support operations in areas of collapsed or unavailable communication infrastructures. Mobile ad-hoc networks rely on routing protocols where each individual device becomes a node of the network. Existing routing protocols concentrate on establishing an efficient distribution of routing information and on routing of messages. However, the particular properties of mobile ad-hoc networks enable various new attacks, in particular targeting routing. Conventional security mechanisms fail to cope with the arising security challenges. Identification of each device and trust relationships between devices become an important function of the complete network. This paper proposes to apply well-known security mechanisms and concepts from the domain of trusted computing in order to establish trust between devices. Attestation of devices is integrated into the mobile ad-hoc network routing protocol and building on this, transmission of routing- and payload data can be restricted to identified devices in trustworthy states. Thus, malicious devices can be automatically recognized by all devices and excluded from participation in the network. Especially the dissemination of misleading routing information, which affects the availability of the whole network, is effectively prevented. A prototypical implementation and first tests in a mobile ad-hoc network test-bed, consisting of nodes equipped with a Trusted Platform Module, demonstrate the feasibility of the approach. The challenges and room for improvement in terms of timing and efficiency are also discussed.

This work was partially supported by the SecFutur EU FP7 project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM (2004)

    Google Scholar 

  2. Carvalho, M.: Security in mobile ad hoc networks. IEEE Security & Privacy 6(2), 72–75 (2008)

    Article  Google Scholar 

  3. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  4. Garg, N., Mahapatra, R.P.: Manet security issues. IJCSNS 9(8), 241 (2009)

    Google Scholar 

  5. Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing (2006)

    Google Scholar 

  6. Ikeda, M., Kulla, E., Hiyama, M., Barolli, L., Takizawa, M.: Experimental results of a manet testbed in indoor stairs environment. In: 2011 IEEE International Conference on Advanced Information Networking and Applications, pp. 779–786. IEEE (2011)

    Google Scholar 

  7. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. Wireless Communication 14(5) (2007)

    Google Scholar 

  8. Kidston, D., Li, L., Tang, H., Mason, P.: Mitigating security threats in tactical networks. In: IST Panel Symposium, Military Communication and Networks, Wroclaw, Poland (2010)

    Google Scholar 

  9. Krishna Kishore, G., Sambasiva Rao, K.V.: An efficient trusted computing base for routing in MANETs. International Journal of Computer Science and Information Technologies 2(5) (2011)

    Google Scholar 

  10. Kuntze, N., Rudolph, C., Fuchs, A.: Trust in Peer-to-Peer Content Distribution Protocols. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 76–89. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Mazhar, N., Farooq, M.: BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 370–381. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: European Wireless Conference, Citeseer (2002)

    Google Scholar 

  13. Mitchell, C.: Trusted computing, vol. 6. Iet (2005)

    Google Scholar 

  14. Neumann, A., Aichele, C., Lindner, M., Wunderlich, S.: Better approach to mobile ad-hoc networking (B.A.T.M.A.N.) (2008)

    Google Scholar 

  15. SourceForge.net. Integrity measurement architecture (ima), http://sourceforge.net/projects/linux-ima

  16. Stumpf, F., Fuchs, A., Katzenbeisser, S., Eckert, C.: Improving the scalability of platform attestation. In: Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC 2008), 31 October, pp. 1–10. ACM Press, Fairfax (2008)

    Chapter  Google Scholar 

  17. Tang, H., Salmanian, M.: Lightweight integrated authentication for tactical manets. In: ICYCS, pp. 2266–2271 (2008)

    Google Scholar 

  18. Trusted Computing Group. TPM 1.2 Main Specification (2011), http://www.trustedcomputinggroup.org/resources/tpm_main_specification

  19. Xu, G., Borcea, C., Iftode, L.: A policy enforcing mechanism for trusted ad hoc networks. IEEE Transactions on Dependable and Secure Computing 8(3) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuntze, N., Rudolph, C., Paatero, J. (2012). Establishing Trust between Nodes in Mobile Ad-Hoc Networks. In: Mitchell, C.J., Tomlinson, A. (eds) Trusted Systems. INTRUST 2012. Lecture Notes in Computer Science, vol 7711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35371-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35371-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35370-3

  • Online ISBN: 978-3-642-35371-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics