A trust-based security environment in MANET: definition and performance evaluation

被引:0
作者
Aida Ben Chehida Douss
Ryma Abassi
Sihem Guemara El Fatmi
机构
[1] Sup’Com University of Carthage Tunis,Higher School of Communication
来源
Annals of Telecommunications | 2017年 / 72卷
关键词
MANET; Clustering; Security; Trust management; Delegation;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the lack of centralized administration or fixed network infrastructure, classic routing protocols cannot be applied in mobile ad hoc network (MANET). Hence, some specific ones have been proposed. Paradoxically, due to its importance in the MANET deployment, routing constitutes a privileged target of attackers. In addition, securing MANET constitutes a hard and challenging task that has attracted many researchers. For our concern, we proposed, in a previous work, a reputation-based trust management scheme built upon a recently proposed mobility-based clustering approach (MCA) which classifies nodes into clusters with one-hop members and elected cluster heads (CHs) and which maintains the organization of the network in the presence of mobility. The whole proposition, baptized trust-based MCA (TMCA), detects and isolates malicious behaviors. In order to improve network performance and to maintain its stability by avoiding the re-invocation of the clustering approach, we propose, in the first step of this work, a delegation process based on TMCA, baptized delegation TMCA-based (DTMCA). This delegation allows the CH to transfer its privileges to a chosen member in case of displacement or energy dissipation. In the second step, simulation experiments are conducted to evaluate the performance of the proposed DTMCA scheme. Finally, in the third step, we suggest to model the entire security process with its three components, namely MCA, TMCA, and DTMCA, in a layered manner. This is realized in order to show the different interactions between these three components.
引用
收藏
页码:491 / 498
页数:7
相关论文
共 15 条
  • [1] Dong P(2015)A maximally radio-disjoint geographic multipath routing protocol for MANET Ann Telecommun 70 207-220
  • [2] Qian H(2012)Analysis of MANET security, architecture and assessment International Journal of Electronics and Computer Science Engineering (IJECSE) 1 787-793
  • [3] Zhou K(2014)An energy aware algorithm for OLSR clustering Ann Telecommun 69 201-207
  • [4] Lu W(2011)Reactive routing evaluation using modified 802.11a with realistic vehicular mobility Ann Telecommun 66 643-656
  • [5] Lan S(undefined)undefined undefined undefined undefined-undefined
  • [6] Kaushik S(undefined)undefined undefined undefined undefined-undefined
  • [7] Loutfi A(undefined)undefined undefined undefined undefined-undefined
  • [8] Elkoutbi M(undefined)undefined undefined undefined undefined-undefined
  • [9] Ben-Othman J(undefined)undefined undefined undefined undefined-undefined
  • [10] Kobbane A(undefined)undefined undefined undefined undefined-undefined