A trust enhanced secure clustering framework for wireless ad hoc networks

被引:17
作者
Chatterjee, Pushpita [1 ]
Ghosh, Uttam [2 ]
Sengupta, Indranil [3 ]
Ghosh, Soumya K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept E&ECE, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept CSE, Kharagpur 721302, W Bengal, India
关键词
Ad hoc networks; Cluster; Security; Trust; Routing; Leader; SCHEME;
D O I
10.1007/s11276-014-0701-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure clustering in Wireless Ad Hoc Networks is a very important issue. Traditional cryptographic solution is useless against threats from internal compromised nodes. In light of this, we propose a novel distributed secure trust aware clustering protocol that provides secure solution for data delivery. A trust model is proposed that computes the trust of a node using self and recommendation evidences of its one-hop neighbors. Therefore, it is lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust. In addition, the proposed clustering protocol organizes the network into one-hop disjoint clusters and elects the most qualified, trustworthy node as a Clusterhead. This election is done by an authenticated voting scheme using parallel multiple signatures. Analysis of the protocol shows that it is more efficient and secure compared to similar existing schemes. Simulation results show that proposed protocol outperforms the popular ECS, CBRP and CBTRP in terms of throughput and packet delivery ratio with a reasonable communication overhead and latency in presence of malicious nodes.
引用
收藏
页码:1669 / 1684
页数:16
相关论文
共 25 条
[1]   NEW LOOK AT STATISTICAL-MODEL IDENTIFICATION [J].
AKAIKE, H .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1974, AC19 (06) :716-723
[2]  
[Anonymous], P 3 INT C NETW SERV
[3]  
Bettstetter C., 2002, Proceedings of the 4th European Wireless, P128
[4]   A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks [J].
Boukerche, Azzedine ;
Ren, Yonglin .
PE-WASUN'08: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF WIRELESS AD-HOC, SENSOR, AND UBIQUITOUS NETWORKS, 2008, :88-95
[5]  
Chatterjee M, 2000, GLOB TELECOMM CONF, P1697, DOI 10.1109/GLOCOM.2000.891926
[6]   STACRP: a secure trusted auction oriented clustering based routing protocol for MANET [J].
Chatterjee, Pushpita ;
Sengupta, Indranil ;
Ghosh, S. K. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2012, 15 (03) :303-320
[7]  
Chiang CC, 1997, NETWORKS: THE NEXT MILLENNINUM - THE IEEE SINGAPORE INTERNATIONAL CONFERENCE ON NETWORKS 1997, IEEE SICON'97, P197
[8]   Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1001-1012
[9]  
DEMPSTER AP, 1968, J ROY STAT SOC B, V30, P205
[10]   Towards designing a trusted routing solution in mobile ad hoc networks [J].
Ghosh, T ;
Pissinou, N ;
Makki, K .
MOBILE NETWORKS & APPLICATIONS, 2005, 10 (06) :985-995