CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Trusted and Secured Clustered Protocol in MANET

by Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 4
Year of Publication: 2016
Authors: Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao
10.5120/ijca2016911999

Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao . Trusted and Secured Clustered Protocol in MANET. International Journal of Computer Applications. 153, 4 ( Nov 2016), 14-20. DOI=10.5120/ijca2016911999

@article{ 10.5120/ijca2016911999,
author = { Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao },
title = { Trusted and Secured Clustered Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 4 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number4/26390-2016911999/ },
doi = { 10.5120/ijca2016911999 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:13.829089+05:30
%A Syeda Kausar Fatima
%A Syed Abdul Sattar
%A D. Srinivasa Rao
%T Trusted and Secured Clustered Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 4
%P 14-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity in connectivity and limited resources it is not possible to deploy centralized security solution. Like many distributed systems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. This work aims at providing a secure and distributed authentication service in ad hoc networks. A trusted and secured clustered protocol in MANET, where clusters are formed based on highly-trusted nodes having sufficient energy is proposed. Secured communication with public key authentication service based on trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network is organised. Efforts to present energy efficient, secure and trusted clustering to enhance the security assurance and significant adaptation of trustworthy communication is presented. Simulation results demonstrate that proposed routing protocols can improve the energy efficiency, packet delivery ratio and route stability.

References
  1. A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
  2. C. Tselikis, S. Mitropoulos, N. Komninos, and C. Douligeris, “Degree-based clustering algorithms for wireless Ad Hoc networks under attack,” IEEE Communications Letters, vol. 16, no. 5, pp. 619–621, 2012.
  3. Y. Zeng, J. Cao, S. Guo, K. Yang and L. Xie, “SWCA: A Secure Weighted Clustering Algorithm in Wireless Ad Hoc Networks”, IEEE Wireless Communications and Networking Conference WCNC, (2009).
  4. I. Nishimura, T. Nagase, Y. Takehana and Y. Yoshioka, “Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Network”, International Conference on Network-Based Information Systems, (2011), pp. 685-689.
  5. H. Rifà-Pous and J. Herrera-Joancomartí, “A Fair and Secure Cluster Formation Process for Ad Hoc Networks”, Journal Wireless Personal Communications: An International Journal archive, vol. 56, no. 3, (2011) February.
  6. V. Sivaranjani and D. Rajalakshmi, “Secure Cluster Head Election for Intrusion Detection in MANET”, Journal of Computer Applications, vol. 5, Issue EICA2012-4, (2012) February 10.
  7. M. Bechler, H. Hof, D. Kraft, F. Pahlke, and L. Wolf, “A ¨ cluster-based security architecture for Ad Hoc networks,” in Proceedings of the 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies (INFOCOM ’04), vol. 4, pp. 2393–2403, March 2004.
  8. W. J. Adams and N. J. Davis, “Toward a decentralized trustbased access control system for dynamic collaboration,” in Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC ’05), pp. 317–324, June 2005.
  9. A. Boukerche and Y. Ren, “A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks,” in Proceedings of the 5th ACM International Symposium on Performance Evaluation of Wireless Ad-Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’08), pp. 88–95, October 2008.
  10. R. Li, J. Li, P. Liu, and H. Chen, “An objective trust management framework for mobile Ad Hoc networks,” in Proceedings of the IEEE 65th Vehicular Technology Conference (VTC ’07), pp. 56– 60, April 2007.
  11. G. Theodorakopoulos and J. S. Baras, “Trust evaluation in adhoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe ’04), pp. 1–10, October 2004.
  12. T. Jiang and J. S. Baras, “Ant-based adaptive trust evidence distribution in MANET,” in Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 588–593, March 2004.
  13. Z. Yan, P. Zhang, and T. Virtan, “Trust evaluation based security solution in Ad Hoc networks,” in Proceedings of 7th Nordic Workshop on Secure IT Systems, 2003.
  14. A. A. Pirzada and C. McDonald, “Establishing trust in pure ad-hoc networks,” in Proceedings of the 27th Australasian Conference on Computer Science (ACSC ’04), vol. 26, pp. 47–54, 2004.
  15. T. Ghosh, N. Pissinou, and K. Makki, “Collaborative trustbased secure routing in multihop Ad Hoc networks,” in NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications: Proceedings of the 3rd International IFIP-TC6 Networking Conference, Athens, Greece, May 9–14, 2004, vol. 3042 of Lecture Notes in Computer Science, pp. 1446–1451, 2004.
  16. T. Ghosh, N. Pissinou, and K. Makki, “Towards designing a trusted routing solution in mobile Ad Hoc networks,” Mobile Networks and Applications, vol. 10, no. 6, pp. 985–995, 2005.
  17. F. Milan, J. J. Jaramillo, and R. Srikant, “Achieving cooperation in multihop wireless networks of selfish nodes,” in Proceedings of the Workshop on Game Theory for Communications and Networks (GameNets ’06), October 2006.
  18. H. Safa, H. Artail, and D. Tabet, “A cluster-based trust-aware routing protocol for mobile Ad Hoc networks,” Wireless Networks, vol. 16, no. 4, pp. 969–984, 2010.
  19. M. Chatterjee, S. K. Das, and D. Turgut, “WCA: a weighted clusrering algorithm for mobile Ad Hoc networks,” Journal of Cluster Computing, vol. 5, no. 2, pp. 193–204, 2002.
  20. P. Chatterjee, I. Sengupta, and S. K. Ghosh, “STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,” Cluster Computing, vol. 15, pp. 303–320, 2012.
  21. Velloso PB et al (2010) Trust management in mobile ad hoc networks using a scalable maturity-based model. In: IEEE Trans. Netw. Service Management, vol. 7, no. 3, pp 172–185
  22. Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Applied Soft Computing 1913–1928
  23. Marmol FG, Perez GM (2010) Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Compute Stand Interfaces 32:185–196
Index Terms

Computer Science
Information Sciences

Keywords

MANET Trust Key management Cluster