Abstract
Self-organized, distributed nature of mobile nodes, frequent changes in topology and shared wireless medium and other characteristics make MANET differ from other networks and encourage military communications that can run on the top of MANET. At the same time, such characteristics pose security threats in military communication. As trust computations play a vital role in decision making and suitable for resource constrained devices, in this paper we propose a Centralized Trust Computation model (CTC) to ensure authentication, based on own experiences, recommendations, social and sense making trusts of team members evaluated by commanders that create an efficient and secure teams based on stereotypes model hence the adversaries who intentionally harm the mission and selfish members due to lack of resources can be identified and isolated from the network by the way authentication can be achieved and secure group can be formed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins, C.E.: Ad Hoc Networking. Addision Wesley (2001)
Stallings, W.: Cryptography and Network Security. Pearson Education (2003)
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)
Introduction to Stereotypes. http://www.Wikipedia.com
Wecik, K.E.: Sensemaking in Organizations. Sage, Thousand Oka (1995)
Wecik, K.E., Sutcliffe, K.M., Obsfeld, D.: Organizations and the Process of Sensemaking. (2005)
Cho, J.-H., Swamia, A., Chen, I.-R.: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35, 1002–1012 (2012)
Sivagurunathan, S., Prathapchandran, K.: A light weight trust based security model for mobile ad hoc networks. In: Proceedings of the International Conference on Electrical, Instrumentations and Communication Engineering-Recent Trends and Research Issues (2015)
Velloso, P.B., Laufer, R.P., de Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: Trust management in mobile ad hoc networks using scalable maturity based model. IEEE Trans. Netw. Serv. Manag. 7, 3 (2010)
Arya, M., Jain, Y.K.: Grayhole attack and prevention in mobile ad hoc network. Int. J. Comput. Appl. 27(10), 21–26 (2011)
Manikandan, S.P., Manimegalai, R.: Trust based routing to mitigate black hole attack in MANET. Life Sci. J. 10(4), 490–498 (2013)
Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27, 4 (2005)
Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust based reactive routing protocols. IEEE Trans. Mob. Comput. 5(6), 695–710 (2006)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen trust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. (2003)
Govinda, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 14, 3 (2012)
Ameza, F., Assam., N, Beghdad, R.: Defending AODV routing protocol against the black hole attack. Int. J. Comput. Sci. Inf. Secur. 8(2), 112–117 (2010)
Acknowledgments
This research work is supported by University Grant Commission, India, through a Major Research Project, Grant (UGC.F No: 42-128/2013 (SR)).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sivagurunathan, S., Prathapchandran, K. (2016). A Centralized Trust Computation (CTC) Model for Secure Group Formation in Military Based Mobile Ad Hoc Networks Using Stereotypes. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-0251-9_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0250-2
Online ISBN: 978-981-10-0251-9
eBook Packages: EngineeringEngineering (R0)