Skip to main content

STCM: Secured Trust-Based Communication Method in Vulnerable Mobile Adhoc Network

  • Conference paper
  • First Online:
  • 1625 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 398))

Abstract

Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequently used technique to ensure security in communication of mobile Adhoc network; however, there are associated issues with cryptographic implementation in security. Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. The proposed system applies a novel design of control message that uses simple tree to maintain certificates and performs authentication of nodes based on trust factor of node with respect to identity and behavioral pattern of the mobile nodes. The outcome of the study shows better security and communication performance in comparison to frequently used routing approaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Basagni S, Conti M, Giordano S, Stojmenovic I (2013) Mobile Ad Hoc networking: the cutting edge directions, vol 35. Wiley (2013)

    Google Scholar 

  2. Cuesta CE, Romay MP (2010) Elements of self-adaptive system-a decentralized architectural perspective. In: Weyns D, Malek S, Lemos R, Andersson J (eds) Self-organizing architectures, LNCS, vol 6090. Springer, Berlin Heidelberg, pp 1–20

    Chapter  Google Scholar 

  3. Rekik JD, Baccouche L, Ghezella HB (2011) An energy and delay-aware routing protocol for mobile Adhoc network. In: Ozcan A, Zizka J, Nagamalai D (eds) Recent trends in wireless and mobile networks, CCIS, vol 162. Springer, Berlin Heidelberg, pp 123–134

    Chapter  Google Scholar 

  4. Guirgui1 SK, Saaid OS (2012) Evaluating the performance of secure routing protocols in mobile Ad-hoc networks. IJARCCE 1(9)

    Google Scholar 

  5. Balachandran N (2012) Surveying solutions to securing on-demand routing protocols in MANETs. arXiv:1207.0758

  6. Raghavendran CHV, Satish GN, Varma PS (2013) Security challenges and attacks in Mobile Ad Hoc networks. IJIEEB 5(3):49–58

    Article  Google Scholar 

  7. Pal DK, Goel PM (2014) Survey on security issues in mobile Ad Hoc networks. IJCSIT 5(3):3732–3735

    Google Scholar 

  8. Zamani AT, Zubair S (2014) Key management scheme in mobile Ad Hoc networks. IJERMT 3(4). ISSN:2278-9359

    Google Scholar 

  9. Sadamate SS, Nandedkar VS (2013) Review paper on calculation, distribution of trust & reputation in MANET, IJSME 1(6)

    Google Scholar 

  10. Khan BUI, Olanrewaju RF, Habaebi MH (2013) Malicious behavior of node and its significant security techniques in MANET—A review. AJBAS 7(12):286–293

    Google Scholar 

  11. Askoxylakis IG, Tryfonas T, May J, Siris V (2011) A family of key agreement mechanisms for mission critical communications for secure mobile Ad Hoc and wireless mesh internetworking. EURASIP J Wireless Commun Netw 13

    Google Scholar 

  12. Li W, Joshi A, Finin T (2011) SMART: an SVM-based misbehavior detection and trust management framework for mobile Ad hoc networks. IEEE-Military Commun, 1102–1109

    Google Scholar 

  13. Akbani R, Korkmaz T (2011) Enhancing role-based trust management with a reputation system for MANETs. EURASIP J Wireless Commun Netw 90

    Google Scholar 

  14. Campos J, Calafate CT, Nacher M (2011) HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J Wirel Commun Netw 3

    Google Scholar 

  15. Huang Z, Ruj S, Cavenaghi M, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw and Appl 7(3):229–242

    Article  Google Scholar 

  16. Shikfa A, Onen M, Molva R (2012) Local key management in opportunistic networks. IJCNDS 9(1–2):97–116

    Article  Google Scholar 

  17. Monisha JH, Uthariaraj R (2012) Diagnosing MAC misbehavior in mobile Ad Hoc networks using statistical methods. IJCSNS 12(5)

    Google Scholar 

  18. Cho JH, Chan KS, Chen R (2013) Composite trust-based public key management in mobile Ad Hoc networks. In: Proceedings of the 28th Annual ACM symposium on applied computing, pp 1949–1956

    Google Scholar 

  19. Abidin AFA, Kolberg M (2013) Establishing trust in VANETs using information from social networks. In: Postgraduate network symposium (PGNet), pp 20–25

    Google Scholar 

  20. Kumar AV, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J

    Google Scholar 

  21. Chen R, Guo J, Bao F, Cho JH (2014) Trust management in mobile Ad Hoc networks for bias minimization and application performance maximization. Elsevier-Ad Hoc Netw 19:59–74

    Article  Google Scholar 

  22. Menaka A, Pushpa ME (2009) Trust based secure routing in AODV routing protocol. In: Proceedings of the 3rd IEEE International conference on internet multimedia services architecture and applications, pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Burhan UI Islam Khan or Nurul Fariza Zulkarnain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Zulkarnain, N.F., Lone, S.A. (2017). STCM: Secured Trust-Based Communication Method in Vulnerable Mobile Adhoc Network. In: Ibrahim, H., Iqbal, S., Teoh, S., Mustaffa, M. (eds) 9th International Conference on Robotic, Vision, Signal Processing and Power Applications. Lecture Notes in Electrical Engineering, vol 398. Springer, Singapore. https://doi.org/10.1007/978-981-10-1721-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1721-6_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1719-3

  • Online ISBN: 978-981-10-1721-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics