Abstract

In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access control cannot be achieved successfully for various network functionalities through traditional cryptographic security, which makes MANET vulnerable to illegitimate node behaviour changes. These node misbehaviours, referred as soft security threats, need to be detected and prevented in order to protect against the accumulation of false measurements with selfish and malicious intentions. Trust has been employed as a powerful tool to handle the soft security threats and to provide security among uncertain and dynamic nodes effectively in MANET. Therefore, it is of great importance that efficient trust management mechanisms should be developed in a public key infrastructure (PKI), in order to verify the identities on the ad hoc networks for reliable and secure group communication. However, the independent nature of nodes and the computational complexities make the trust management a challenging one in MANET. In this paper, we present an efficient distributed trust computation and misbehaviour verification method with Bayesian and Evidence theorem, on hexagonally clustered MANET. Besides, a secured PKI system is designed in the paper by applying the proposed trust management scheme in terms of certificate revocation, which is an important functionality of PKI cryptosystem. The uncertainty impacts the node’s anticipation of neighbour’s behaviour and decisions during communication; we include uncertainty in the trust management system. An efficient method to reduce the uncertainty is to exploit the mobility characteristics of MANET that accelerates the trust convergence. The simulation results reveal a better performance against adversaries in creating considerable untrustworthy transactions with a mobility-aware cluster guarantee. Moreover, the proposed trust application shows its betterment in the revocation process in terms of revocation rate and time. Thus, the proposed scheme provides an effective security solution that incorporates the optimistic features of trust mechanisms and hierarchical Voronoi clustering.

Highlights

  • In mobile ad hoc network (MANET), malicious attacks on different layers have been identified and analysed by researchers over several years

  • The invasions from the adversaries make a node misbehave or malicious at any time during communication. Considering this as a significant issue, we propose a trust management and clustering model to enhance the security of public key infrastructure (PKI) infrastructure in MANET

  • To construct a highly desirable uncertain clustering cell in MANET, we propose to use Voronoi diagrams (VD) based clustering in which the clustering issues are managed considering the drawbacks of existing UC methods

Read more

Summary

Introduction

In mobile ad hoc network (MANET), malicious attacks on different layers have been identified and analysed by researchers over several years. 2.1 Trust management in MANET Numerous trust models have been proposed for secure node communication based on sharing group recommendation to establish cooperation in computational networks [4,5,6,7]. The invasions from the adversaries make a node misbehave or malicious at any time during communication Considering this as a significant issue, we propose a trust management and clustering model to enhance the security of PKI infrastructure in MANET. To compute the closeness of the node and the cluster representative, different methods based on mean, Euclidean distance and probability have been in practice These traditional clustering techniques of uncertain nodes increase the computational complexities and communication cost in mobile environment, especially in mobile ad hoc networks.

Cluster head selection
10 Performance analysis
10.1.2 Performance metrics
Findings
11 Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.