Trust-Based Anonymous Communication for Malicious User Disclosure in Mobile Ad Hoc Networks

被引:0
作者
Gunasekaran, M. [1 ]
Premalatha, K. [2 ]
机构
[1] Bannari Amman Inst Technol, Dept Comp Appl, Sathyamangalam, Tamil Nadu, India
[2] Bannari Amman Inst Technol, Dept Comp Sci & Engn, Sathyamangalam, Tamil Nadu, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT) | 2012年
关键词
Anonymity; routing; trust; security; malicious users; MANETs;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susceptible to security attacks from malicious users. This paper introduces the concept of anonymity for an informant who identifies and discloses anonymously the malicious behavior of other users in the network. This paper proposes the Trust-Based Anonymous Communication Technique (TACT) to provide anonymity for an informant and liability for the malicious users who attempt to misuse the anonymity property. The TACT restrains the misuse of anonymity in such a way that any user not sending cooperation message utmost once, upon receiving warnings two times is identified and also any user sending multiple cooperation messages per warning per malicious behavior type will also be termed as malicious user. The proposed technique is designed based on "broadcast with trapdoor information" a cryptography concept to monitor the users and to report malicious users to the network anonymously. The simulation results prove the necessity of anonymity in MANET and the effectiveness of this protocol in achieving such anonymity.
引用
收藏
页数:9
相关论文
共 23 条
[1]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[2]  
Bo Zhu, 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P358, DOI 10.1109/ICDCS.Workshops.2008.23
[3]  
Cao GZ, 2009, 2009 3RD INTERNATIONAL CONFERENCE ON POWER ELECTRONICS SYSTEMS AND APPLICATIONS: ELECTRIC VEHICLE AND GREEN ENERGY, P100
[4]  
Chen Ruiliang, P GLOB TEL C IEEE GL, P1
[5]   ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks [J].
Choi, Heesook ;
Enck, William ;
Shin, Jaesheung ;
McDaniel, Patrick D. ;
La Porta, Thomas F. .
WIRELESS NETWORKS, 2009, 15 (04) :525-539
[6]  
Johnson D., 1999, 9934 CORR CACR U WAT
[7]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[8]  
Kong Jiejun., 2003, P ACM MOBIHOC, P291
[9]   An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks [J].
Li, Xiaoqing ;
Li, Hui ;
Ma, Jianfeng ;
Zhang, Weidong .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :287-290
[10]  
Liu J, 2006, CURR TOP MICROBIOL, V302, P1