Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Abstract

Mobile Ad hoc Network (MANET) is a wireless network of mobile nodes or mobile devices are connected without any specific infrastructure; it has the properties of self-configuration and self-maintenance nature, so it does not have any centralized control. The basic requirement for ad hoc network is to provide security. For providing authentication (trust) to the nodes, secure routing is the primary challenge. For improving the security, the most important thing is to examine the trustworthiness of nodes or mobile devices by identifying selfish and malicious nodes in the network. We are using the concept of trust and applying it on popular routing protocols of MANETs like DSR and AODV for providing secure routing. And also we are using the following algorithms, calculation of trust value (level) algorithm, identification of node misbehavior and modification of trust value algorithm, certificate distribution algorithm, and route innovation and maintenance algorithm for all the nodes in the network. Now, our concept of certificate-based trust and algorithms deals with the malicious nodes and provides a high secure routing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. K. Gowri Raghavendra Narayan, N.V. Ramana Gupta, Dr. M.V. Rama Krishna, “A Survey on Performance Ascertainment of MANET Routing Protocols Using NS-2”, International Journal of Engineering and Technical Research (IJETR) ISSN: 2321–0869 (O) 2454-4698 (P), Volume-3, Issue-9, September 2015.

    Google Scholar 

  2. Wenjia Li, Anupam Joshi: “Security Issues in Mobile Ad Hoc Networks—A Survey”. WISE-WA, wireless sensor networks for the city-wide Ambient Intelligence.

    Google Scholar 

  3. M. Ali Dorri and Seyed Reza Kamel and Esmail kheyrkhah Security Challenges In Mobile Ad-hoc Networks: A Survey, International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 6, No. 1, February 2015. DOI:10.5121/ijcses.2015.6102.

  4. Asad Amir Pirzada, Chris McDonald “Establishing Trust In Pure Ad-hoc Networks”, in Conferences in Research and Practice in Information Technology-2004.

    Google Scholar 

  5. Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Nei Kato “A Study on Certificate Revocation in Mobile Ad Hoc Networks” IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011.

    Google Scholar 

  6. Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee Aniruddha Bhattacharyya, Arnab Banerjee, Dipayan Bose, “Study Of Different Attacks In MANET With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology, IJAET/Vol.III/ Issue I/January-March, 2012/383–388 E-ISSN 0976-3945.

    Google Scholar 

  7. Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber “Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks” in Security in Ad-hoc and Sensor Networks chapter, springer, DOI 10.1007/978-3-540-30496-8_13, Print ISBN 978-3-540-24396-0, Online ISBN 978-3-540-30496-8, pages: 152-165.

  8. Md. Amir Khusru Akhtar, G. Sahoo, “A Novel Methodology to Overcome Routing Misbehavior in MANET Using Retaliation Model” International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013, DOI: 10.5121/ijwmn.2013.5414, pages: 187–202.

  9. “Network simulator” http://www.isi.edu/nsnam/ns/, and https://www.nsnam.org.

  10. “NS Simulator for Beginners” written by Eitan_Altman_Tania_Jimenez.

    Google Scholar 

  11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.

    Google Scholar 

  12. Gunuplot http://www.gnuplot.info/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Gowri Raghavendra Narayan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narayan, K.G.R., Rao, T.S., Raju, P.P., Sudhakar, P. (2018). A Study on Certificate-Based Trust in MANETs. In: Chaki, N., Cortesi, A., Devarakonda, N. (eds) Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 9. Springer, Singapore. https://doi.org/10.1007/978-981-10-6319-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6319-0_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6318-3

  • Online ISBN: 978-981-10-6319-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics