Distributed and Parallel Databases

, Volume 31, Issue 2, pp 353–376 | Cite as

CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies

Article

Abstract

Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.

Keywords

Mobile ad-hoc network Security Trust Misbehavior detection Context awareness Policy 

References

  1. 1.
    Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: MobiHoc’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002) CrossRefGoogle Scholar
  2. 2.
    Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 191–199. IEEE Press, New York (2005) CrossRefGoogle Scholar
  3. 3.
    Li, W., Parker, J., Joshi, A.: Security through collaboration in manets. In: Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 696–714. Springer, Berlin (2008) Google Scholar
  4. 4.
    Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM’09, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2009) CrossRefGoogle Scholar
  5. 5.
    Li, W., Joshi, A., Finin, T.: Policy-based malicious peer detection in ad hoc networks. In: Proceedings of the International Conference on Computational Science and Engineering, CSE’09, vol. 3, pp. 76–82. IEEE Comput. Soc., Los Alamitos (2009) CrossRefGoogle Scholar
  6. 6.
    Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mobile Networks and Applications (MONET) 17(3), 342–352 (2012) CrossRefGoogle Scholar
  7. 7.
    Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283. ACM, New York (2000) Google Scholar
  8. 8.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000) Google Scholar
  9. 9.
    Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe’04: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004) Google Scholar
  10. 10.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006) CrossRefGoogle Scholar
  11. 11.
    Parker, J., Patwardhan, A., Joshi, A.: Cross-layer analysis for detecting wireless misbehavior. In: Proceedings of the Third IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 6–9. IEEE Press, New York (2006) CrossRefGoogle Scholar
  12. 12.
    Buchegger, S., Le Boudee, J.-Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005) CrossRefGoogle Scholar
  13. 13.
    Yau, P.-W., Mitchell, C.J.: Security vulnerabilities in ad hoc networks. In: Proceedings of the 7th International Symposium on Communication Theory and Applications, pp. 99–104 (2003) Google Scholar
  14. 14.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic, Dordrecht (2002) Google Scholar
  15. 15.
    Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999) CrossRefGoogle Scholar
  16. 16.
    Deng, H., Zeng, Q.-A., Agrawal, D.: Svm-based intrusion detection system for wireless ad hoc networks. In: Proceedings of 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall vol. 3, pp. 2147–2151 (2003). 2003 CrossRefGoogle Scholar
  17. 17.
    Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for aodv. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134. ACM, New York (2003) CrossRefGoogle Scholar
  18. 18.
    Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147. ACM, New York (2003) CrossRefGoogle Scholar
  19. 19.
    Li, W., Joshi, A., Finin, T.: Atm: automated trust management for mobile ad hoc networks using support vector machine. In: 12th IEEE International Conference on Mobile Data Management (MDM), pp. 291–292 (2011) CrossRefGoogle Scholar
  20. 20.
    Li, W., Joshi, A., Finin, T.: Sat: an svm-based automated trust management system for mobile ad-hoc networks. In: 2011 IEEE Military Communications Conference (MILCOM2011), pp. 1102–1107 (2011) Google Scholar
  21. 21.
    Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom’03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM, New York (2003) Google Scholar
  22. 22.
    Xue, Y., Nahrstedt, K.: Providing fault-tolerant ad hoc routing service in adversarial environments. Wirel. Pers. Commun. 29(3–4), 367–388 (2004) CrossRefGoogle Scholar
  23. 23.
    Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 91–100. ACM, New York (2006) CrossRefGoogle Scholar
  24. 24.
    Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon (2003) Google Scholar
  25. 25.
    He, Q., Wu, D., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC’04, vol. 2, pp. 825–830 (2004) Google Scholar
  26. 26.
    Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003) Google Scholar
  27. 27.
    Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous’06, pp. 1–8 (2006) CrossRefGoogle Scholar
  28. 28.
    Ren, Y., Boukerche, A.: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In: Proceedings of 2009 IEEE International Conference on Communications, ICC’09, pp. 1–5 (2009) CrossRefGoogle Scholar
  29. 29.
    Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management 2, 333–360 (1994) CrossRefGoogle Scholar
  30. 30.
    Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003 (2003) Google Scholar
  31. 31.
    Godik, S., Moses, T.: Oasis Extensible Access Control Markup Language (xacml) (2002) Google Scholar
  32. 32.
    Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007) CrossRefGoogle Scholar
  33. 33.
  34. 34.
    Eriksson, J., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: The Sixth Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2008), Breckenridge, USA (2008) Google Scholar
  35. 35.
    Carroll, J.J., Dickinson, I., Dollin, C., Reynolds, D., Seaborne, A., Wilkinson, K.: Jena: implementing the semantic web recommendations. In: Proceedings of the 13th International World Wide Web Conference, WWW 2004, pp. 74–83. ACM, New York (2004) Google Scholar
  36. 36.
    Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11, 1–21 (1969) CrossRefGoogle Scholar
  37. 37.
    Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976) MATHGoogle Scholar
  38. 38.
    Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: a library for parallel simulation of large-scale wireless networks. ACM SIGSIM Simulation Digest 28(1), 154–161 (1998) CrossRefGoogle Scholar
  39. 39.
    Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management, MDM’10, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2010) Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Department of Computer SciencesGeorgia Southern UniversityStatesboroUSA
  2. 2.Department of CSEEUniversity of MarylandBaltimoreUSA

Personalised recommendations