A Model for Specification and Validation of a Trust Management based Security Scheme in a MANET Environment

被引:0
|
作者
Douss, Aida Ben Chehida [1 ]
Abassi, Ryma [1 ]
El Fatmi, Sihem Guemara [1 ]
机构
[1] Univ Carthage, Higher Sch Commun, SupCom, Tunis, Tunisia
来源
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 | 2015年
关键词
MANET; Specification; Validation; Consistency; Completeness;
D O I
10.1109/ARES.2015.92
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, we proposed a reputation based trust management scheme built upon a Mobility-based Clustering Approach (MCA) organizing Mobile Ad hoc NETwork MANET and detecting and isolating malicious behaviors. The whole scheme was called TMCA (Trust based MCA) and was extended in a second time with a delegation process resulting a proposition baptized DTMCA (Delegation TMCA based process). However, deploying such scheme is error prone and it appears necessary to validate it before its real implementation. In fact, scheme specification and validation constitute two fundamental challenges in the development of secure communication systems ensuring that the scheme is correctly enforced and complete. Hence, the main contribution of this paper concerns a validation framework for DTMCA scheme. The first step towards validation process is its formal specification. This is our first concern in this paper: a formal specification language called SCMSL (Secured Clustered MANET Specification Language) defined through a syntax based on authorization and obligation rules and a clear semantics. The second part of this paper proves the two major characteristics that must be guaranteed in such case: consistency and completeness. Consistency is proved by showing that there is no conflict in our scheme whereas completeness is proved by assessing that all potential situations are handled. The proof of consistency and completeness is made using automated systems through the definition of adequate algorithms.
引用
收藏
页码:341 / 350
页数:10
相关论文
共 34 条
  • [11] An Effective Management Model for Data Caching in MANET Environment
    Abu Salem, Amer
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (06) : 841 - 851
  • [12] A Cooperative Routing for MANET Based on Distributed Trust and Energy Management
    U. Venkanna
    Jeh Krishna Agarwal
    R. Leela Velusamy
    Wireless Personal Communications, 2015, 81 : 961 - 979
  • [13] A Cooperative Routing for MANET Based on Distributed Trust and Energy Management
    Venkanna, U.
    Agarwal, Jeh Krishna
    Velusamy, R. Leela
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (03) : 961 - 979
  • [14] Trust Management-Based Service Recovery and Attack Prevention in MANET
    Nivedita, V.
    Nandhagopal, N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 29 (03) : 771 - 786
  • [15] RTO-TV: Routed Tree Optimization and Trust-Value-Based Security Scheme to Prevent Black Hole Attack in MANET
    Kumari, S. Vadhana
    Sibi, S. Anslam
    Selvan, Shano Maria
    Nadar, Kannan Pauliah
    JOURNAL OF SENSORS, 2024, 2024
  • [16] A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
    Bijon, Khalid Zaman
    Haque, Md Munirul
    Hasan, Ragib
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 347 - 354
  • [17] Trust-based intrusion detection with secure key management integrated into MANET
    Shanthi, K.
    Murugan, D.
    Ganesh Kumar, T.
    INFORMATION SECURITY JOURNAL, 2018, 27 (04): : 183 - 191
  • [18] Trust based blockchain security management in edge computing
    Jayakumara, D.
    Kumar, K. Santhosh
    Sathya, R.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 (02): : 2189 - 2197
  • [19] Specification, verification, and quantification of security in model-based systems
    Ouchani, Samir
    Debbabi, Mourad
    COMPUTING, 2015, 97 (07) : 691 - 711
  • [20] Specification, verification, and quantification of security in model-based systems
    Samir Ouchani
    Mourad Debbabi
    Computing, 2015, 97 : 691 - 711