A Model for Specification and Validation of a Trust Management based Security Scheme in a MANET Environment

被引:0
|
作者
Douss, Aida Ben Chehida [1 ]
Abassi, Ryma [1 ]
El Fatmi, Sihem Guemara [1 ]
机构
[1] Univ Carthage, Higher Sch Commun, SupCom, Tunis, Tunisia
来源
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 | 2015年
关键词
MANET; Specification; Validation; Consistency; Completeness;
D O I
10.1109/ARES.2015.92
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, we proposed a reputation based trust management scheme built upon a Mobility-based Clustering Approach (MCA) organizing Mobile Ad hoc NETwork MANET and detecting and isolating malicious behaviors. The whole scheme was called TMCA (Trust based MCA) and was extended in a second time with a delegation process resulting a proposition baptized DTMCA (Delegation TMCA based process). However, deploying such scheme is error prone and it appears necessary to validate it before its real implementation. In fact, scheme specification and validation constitute two fundamental challenges in the development of secure communication systems ensuring that the scheme is correctly enforced and complete. Hence, the main contribution of this paper concerns a validation framework for DTMCA scheme. The first step towards validation process is its formal specification. This is our first concern in this paper: a formal specification language called SCMSL (Secured Clustered MANET Specification Language) defined through a syntax based on authorization and obligation rules and a clear semantics. The second part of this paper proves the two major characteristics that must be guaranteed in such case: consistency and completeness. Consistency is proved by showing that there is no conflict in our scheme whereas completeness is proved by assessing that all potential situations are handled. The proof of consistency and completeness is made using automated systems through the definition of adequate algorithms.
引用
收藏
页码:341 / 350
页数:10
相关论文
共 34 条
  • [1] A Trust Management based Security Mechanism against Collusion Attacks in a MANET Environment
    Douss, Aida Ben Chehida
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 325 - 332
  • [2] Security and Trust Management in MANET
    Singh, Akash
    Maheshwari, Manish
    Nikhil
    Kumar, Neeraj
    INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 384 - 387
  • [3] UNIFIED TRUST MANAGEMENT SCHEME THAT ENHANCES THE SECURITY IN MANET USING UNCERTAIN REASONING
    Sasirehka, S.
    Vijayakumar, S.
    Abinaya, K.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1589 - 1595
  • [4] UNIFIED TRUST MANAGEMENT SCHEME THAT ENHANCES THE SECURITY IN MANET USING UNCERTAIN REASONING
    Sasirehka, S.
    Vijayakumar, S.
    Abinaya, K.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1497 - 1505
  • [5] A trust-based security environment in MANET: definition and performance evaluation
    Douss, Aida Ben Chehida
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (7-8) : 491 - 498
  • [6] A trust-based security environment in MANET: definition and performance evaluation
    Aida Ben Chehida Douss
    Ryma Abassi
    Sihem Guemara El Fatmi
    Annals of Telecommunications, 2017, 72 : 491 - 498
  • [7] SPECIFICATION AND VALIDATION OF A SECURITY POLICY MODEL
    BOSWELL, A
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (02) : 63 - 68
  • [8] Security Based Adversary Prevention Scheme for MANET
    Rajinikanth, C.
    Mohanarathinam, A.
    Hemalakshmi, G. R.
    Manikandan, B.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (02): : 154 - 158
  • [9] Issues with Trust Management and Trust Based Secure Routing in MANET
    Ullah, Zakir
    Islam, Muhammad Hasan
    Khan, Adnan Ahmed
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 402 - 408
  • [10] Analysis and Prevention of Wormhole Attack Using Trust And Reputation Management Scheme in MANET
    Parbin, Shabina
    Mahor, Leeladhar
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 225 - 228