Skip to main content

A Centralized Trust Computation (CTC) Model for Secure Group Formation in Military Based Mobile Ad Hoc Networks Using Stereotypes

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

Self-organized, distributed nature of mobile nodes, frequent changes in topology and shared wireless medium and other characteristics make MANET differ from other networks and encourage military communications that can run on the top of MANET. At the same time, such characteristics pose security threats in military communication. As trust computations play a vital role in decision making and suitable for resource constrained devices, in this paper we propose a Centralized Trust Computation model (CTC) to ensure authentication, based on own experiences, recommendations, social and sense making trusts of team members evaluated by commanders that create an efficient and secure teams based on stereotypes model hence the adversaries who intentionally harm the mission and selfish members due to lack of resources can be identified and isolated from the network by the way authentication can be achieved and secure group can be formed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perkins, C.E.: Ad Hoc Networking. Addision Wesley (2001)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security. Pearson Education (2003)

    Google Scholar 

  3. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Google Scholar 

  4. Introduction to Stereotypes. http://www.Wikipedia.com

  5. Wecik, K.E.: Sensemaking in Organizations. Sage, Thousand Oka (1995)

    Google Scholar 

  6. Wecik, K.E., Sutcliffe, K.M., Obsfeld, D.: Organizations and the Process of Sensemaking. (2005)

    Google Scholar 

  7. Cho, J.-H., Swamia, A., Chen, I.-R.: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35, 1002–1012 (2012)

    Article  Google Scholar 

  8. Sivagurunathan, S., Prathapchandran, K.: A light weight trust based security model for mobile ad hoc networks. In: Proceedings of the International Conference on Electrical, Instrumentations and Communication Engineering-Recent Trends and Research Issues (2015)

    Google Scholar 

  9. Velloso, P.B., Laufer, R.P., de Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: Trust management in mobile ad hoc networks using scalable maturity based model. IEEE Trans. Netw. Serv. Manag. 7, 3 (2010)

    Google Scholar 

  10. Arya, M., Jain, Y.K.: Grayhole attack and prevention in mobile ad hoc network. Int. J. Comput. Appl. 27(10), 21–26 (2011)

    Google Scholar 

  11. Manikandan, S.P., Manimegalai, R.: Trust based routing to mitigate black hole attack in MANET. Life Sci. J. 10(4), 490–498 (2013)

    Google Scholar 

  12. Jin, S., Park, C., Choi, D., Chung, K., Yoon, H.: Cluster-based trust evaluation scheme in an ad hoc network. ETRI J. 27, 4 (2005)

    Google Scholar 

  13. Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust based reactive routing protocols. IEEE Trans. Mob. Comput. 5(6), 695–710 (2006)

    Article  Google Scholar 

  14. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen trust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. (2003)

    Google Scholar 

  15. Govinda, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 14, 3 (2012)

    Google Scholar 

  16. Ameza, F., Assam., N, Beghdad, R.: Defending AODV routing protocol against the black hole attack. Int. J. Comput. Sci. Inf. Secur. 8(2), 112–117 (2010)

    Google Scholar 

Download references

Acknowledgments

This research work is supported by University Grant Commission, India, through a Major Research Project, Grant (UGC.F No: 42-128/2013 (SR)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sivagurunathan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sivagurunathan, S., Prathapchandran, K. (2016). A Centralized Trust Computation (CTC) Model for Secure Group Formation in Military Based Mobile Ad Hoc Networks Using Stereotypes. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics