A trust enhanced secure clustering framework for wireless ad hoc networks

被引:17
|
作者
Chatterjee, Pushpita [1 ]
Ghosh, Uttam [2 ]
Sengupta, Indranil [3 ]
Ghosh, Soumya K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept E&ECE, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept CSE, Kharagpur 721302, W Bengal, India
关键词
Ad hoc networks; Cluster; Security; Trust; Routing; Leader; SCHEME;
D O I
10.1007/s11276-014-0701-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure clustering in Wireless Ad Hoc Networks is a very important issue. Traditional cryptographic solution is useless against threats from internal compromised nodes. In light of this, we propose a novel distributed secure trust aware clustering protocol that provides secure solution for data delivery. A trust model is proposed that computes the trust of a node using self and recommendation evidences of its one-hop neighbors. Therefore, it is lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust. In addition, the proposed clustering protocol organizes the network into one-hop disjoint clusters and elects the most qualified, trustworthy node as a Clusterhead. This election is done by an authenticated voting scheme using parallel multiple signatures. Analysis of the protocol shows that it is more efficient and secure compared to similar existing schemes. Simulation results show that proposed protocol outperforms the popular ECS, CBRP and CBTRP in terms of throughput and packet delivery ratio with a reasonable communication overhead and latency in presence of malicious nodes.
引用
收藏
页码:1669 / 1684
页数:16
相关论文
共 50 条
  • [11] TBCS: A Trust Based Clustering Scheme for Secure Communication in Flying Ad-Hoc Networks
    Singh, Kuldeep
    Verma, Anil Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3173 - 3196
  • [12] TBCS: A Trust Based Clustering Scheme for Secure Communication in Flying Ad-Hoc Networks
    Kuldeep Singh
    Anil Kumar Verma
    Wireless Personal Communications, 2020, 114 : 3173 - 3196
  • [13] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [14] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [15] Secure Coded Caching in Wireless Ad Hoc Networks
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 387 - 391
  • [16] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [17] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [18] Secure data forwarding in wireless ad hoc networks
    Huang, Q
    Avramopoulos, IC
    Kobayashi, H
    Liu, B
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3525 - 3531
  • [19] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132
  • [20] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221