An Optimized Reputation-Based Trust Management Scheme for MANET Security

Author(s):  
Aida Ben Chehida Douss ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Because mobile ad hoc networks (MANETs) have neither infrastructure support nor central administration, they imply their nodes in the routing process. Having that this latter is fundamental in a MANET deployment, it constitutes a privileged target of attackers. For instance, malicious nodes can refuse to route packets or modify their content in order to disrupt the network and to deteriorate the transmission quality. All these features raise several security challenges for the routing process making more difficult to design and implement security solutions for MANETs than for wired networks. The main contribution of this chapter is to propose a generic environment securing routing in MANETs on which a trust and reputation mechanism is defined. This environment is built upon a specific mobility-based clustering approach (MCA) organizing MANETs' nodes into clusters. Moreover, a trust management process and a delegation mechanism allowing the localization and the isolation of malicious nodes are used. The whole environment is baptized DTMCA (delegation trust MCA-based process).

2020 ◽  
Vol 16 (7) ◽  
pp. 155014772093937 ◽  
Author(s):  
Ibrahim Abdo Rai ◽  
Riaz Ahmed Shaikh ◽  
Syed Raheel Hassan

Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers or central authorities, for example, roadside units and reputation management centers to ensure message reliability and build nodes’ reputation. Also, none of the proposed schemes operate in different environments, for example, urban and rural. To overcome these limitations, we propose a novel trust management scheme for self-organized vehicular ad-hoc networks. The scheme is based on a crediting technique and does not rely on other peers or central authorities which distinguishes it as an economical solution. Moreover, it is hybrid, in the sense it is data-based and entity-based which makes it capable of revoking malicious nodes and discarding fake messages. Furthermore, it operates in a dual-mode (urban and rural). The simulation has been performed utilizing Veins, an open-source framework along with OMNeT++, a network simulator, and SUMO, a traffic simulator. The scheme has been tested with two trust models (urban and rural). The simulation results prove the performance and security efficacy of the proposed scheme.


2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Sign in / Sign up

Export Citation Format

Share Document