Abstract
Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequently used technique to ensure security in communication of mobile Adhoc network; however, there are associated issues with cryptographic implementation in security. Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. The proposed system applies a novel design of control message that uses simple tree to maintain certificates and performs authentication of nodes based on trust factor of node with respect to identity and behavioral pattern of the mobile nodes. The outcome of the study shows better security and communication performance in comparison to frequently used routing approaches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Basagni S, Conti M, Giordano S, Stojmenovic I (2013) Mobile Ad Hoc networking: the cutting edge directions, vol 35. Wiley (2013)
Cuesta CE, Romay MP (2010) Elements of self-adaptive system-a decentralized architectural perspective. In: Weyns D, Malek S, Lemos R, Andersson J (eds) Self-organizing architectures, LNCS, vol 6090. Springer, Berlin Heidelberg, pp 1–20
Rekik JD, Baccouche L, Ghezella HB (2011) An energy and delay-aware routing protocol for mobile Adhoc network. In: Ozcan A, Zizka J, Nagamalai D (eds) Recent trends in wireless and mobile networks, CCIS, vol 162. Springer, Berlin Heidelberg, pp 123–134
Guirgui1 SK, Saaid OS (2012) Evaluating the performance of secure routing protocols in mobile Ad-hoc networks. IJARCCE 1(9)
Balachandran N (2012) Surveying solutions to securing on-demand routing protocols in MANETs. arXiv:1207.0758
Raghavendran CHV, Satish GN, Varma PS (2013) Security challenges and attacks in Mobile Ad Hoc networks. IJIEEB 5(3):49–58
Pal DK, Goel PM (2014) Survey on security issues in mobile Ad Hoc networks. IJCSIT 5(3):3732–3735
Zamani AT, Zubair S (2014) Key management scheme in mobile Ad Hoc networks. IJERMT 3(4). ISSN:2278-9359
Sadamate SS, Nandedkar VS (2013) Review paper on calculation, distribution of trust & reputation in MANET, IJSME 1(6)
Khan BUI, Olanrewaju RF, Habaebi MH (2013) Malicious behavior of node and its significant security techniques in MANET—A review. AJBAS 7(12):286–293
Askoxylakis IG, Tryfonas T, May J, Siris V (2011) A family of key agreement mechanisms for mission critical communications for secure mobile Ad Hoc and wireless mesh internetworking. EURASIP J Wireless Commun Netw 13
Li W, Joshi A, Finin T (2011) SMART: an SVM-based misbehavior detection and trust management framework for mobile Ad hoc networks. IEEE-Military Commun, 1102–1109
Akbani R, Korkmaz T (2011) Enhancing role-based trust management with a reputation system for MANETs. EURASIP J Wireless Commun Netw 90
Campos J, Calafate CT, Nacher M (2011) HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J Wirel Commun Netw 3
Huang Z, Ruj S, Cavenaghi M, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw and Appl 7(3):229–242
Shikfa A, Onen M, Molva R (2012) Local key management in opportunistic networks. IJCNDS 9(1–2):97–116
Monisha JH, Uthariaraj R (2012) Diagnosing MAC misbehavior in mobile Ad Hoc networks using statistical methods. IJCSNS 12(5)
Cho JH, Chan KS, Chen R (2013) Composite trust-based public key management in mobile Ad Hoc networks. In: Proceedings of the 28th Annual ACM symposium on applied computing, pp 1949–1956
Abidin AFA, Kolberg M (2013) Establishing trust in VANETs using information from social networks. In: Postgraduate network symposium (PGNet), pp 20–25
Kumar AV, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J
Chen R, Guo J, Bao F, Cho JH (2014) Trust management in mobile Ad Hoc networks for bias minimization and application performance maximization. Elsevier-Ad Hoc Netw 19:59–74
Menaka A, Pushpa ME (2009) Trust based secure routing in AODV routing protocol. In: Proceedings of the 3rd IEEE International conference on internet multimedia services architecture and applications, pp 1–6
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Zulkarnain, N.F., Lone, S.A. (2017). STCM: Secured Trust-Based Communication Method in Vulnerable Mobile Adhoc Network. In: Ibrahim, H., Iqbal, S., Teoh, S., Mustaffa, M. (eds) 9th International Conference on Robotic, Vision, Signal Processing and Power Applications. Lecture Notes in Electrical Engineering, vol 398. Springer, Singapore. https://doi.org/10.1007/978-981-10-1721-6_17
Download citation
DOI: https://doi.org/10.1007/978-981-10-1721-6_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1719-3
Online ISBN: 978-981-10-1721-6
eBook Packages: EngineeringEngineering (R0)