CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies

被引:0
作者
Wenjia Li
Anupam Joshi
Tim Finin
机构
[1] Georgia Southern University,Department of Computer Sciences
[2] University of Maryland,Department of CSEE
来源
Distributed and Parallel Databases | 2013年 / 31卷
关键词
Mobile ad-hoc network; Security; Trust; Misbehavior detection; Context awareness; Policy;
D O I
暂无
中图分类号
学科分类号
摘要
Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.
引用
收藏
页码:353 / 376
页数:23
相关论文
共 19 条
[1]  
Li W.(2012)Security through collaboration and trust in manets Mobile Networks and Applications (MONET) 17 342-352
[2]  
Parker J.(2005)Self-policing mobile ad hoc networks by reputation systems IEEE Communications Magazine 43 101-107
[3]  
Joshi A.(1999)Securing ad hoc networks IEEE Network 13 24-30
[4]  
Buchegger S.(2004)Providing fault-tolerant ad hoc routing service in adversarial environments Wirel. Pers. Commun. 29 367-388
[5]  
Le Boudee J.-Y.(1994)Policy driven management for distributed systems Journal of Network and Systems Management 2 333-360
[6]  
Zhou L.(2007)Secure and efficient key management in mobile ad hoc networks Journal of Network and Computer Applications 30 937-954
[7]  
Haas Z.(1969)Procedures for detecting outlying observations in samples Technometrics 11 1-21
[8]  
Xue Y.(1998)Glomosim: a library for parallel simulation of large-scale wireless networks ACM SIGSIM Simulation Digest 28 154-161
[9]  
Nahrstedt K.(undefined)undefined undefined undefined undefined-undefined
[10]  
Sloman M.(undefined)undefined undefined undefined undefined-undefined