Skip to main content
Log in

Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network. Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographic clustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Flow chart 1
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14

Similar content being viewed by others

References

  1. Ko Y B and Vaidya N H 1999 Geocasting in mobile ad hoc networks: Location-based multicast algorithms. In: Proceedings of IEEE WMCSA, pp. 101–110

  2. Bellur B 2008 Certificate assignment strategies for a pki-based security architecture in a vehicular network. Proceedings IEEE GLOBECOM, pp 1–6

  3. Chang R S and Wang S H 2008 Hexagonal collaboration groups in sensor networks. Proc. IEEE CCNC pp 358–359

  4. Zhuang Y, Gulliver T A and Coady Y 2013 On planar tessellations and interference estimation in wireless ad-hoc networks. IEEE Wireless Commun. Lett. 2(3): 331–334

  5. Fan Y, Yulan Z and Ping X 2015 An overview of ad hoc network security. communications in computer and information science, Springer, vol. 557, pp 129–137

  6. Cao M and Hadjicostis C N 2003 Distributed algorithms for Voronoi diagrams and applications in ad-hoc networks. Technical Report UILUENG-03-2222

  7. Chau M, Cheng R, B Kao B and Ng J 2006 Uncertain data mining: An example in clustering location data. In: Proceedings of PAKDD, pp 199–204

  8. Cheng R, Xie X, Yiu M L, Chen J and Sun L 2010 Uv-diagram: A Voronoi diagram for uncertain data. In: Proceedings of 26th IEEE International Conference on Data Engineering, pp 796–807

  9. Kao B, Lee S D, Lee F, Cheung D and Ho W S 2010 Clustering uncertain data using Voronoi diagrams and R-tree index. IEEE Trans. Knowledge and Data Eng. 22(9): 1219–1233

  10. Mohamed Aissa and Abdelfettah Belghith 2014 A node quality based clustering algorithm in wireless mobile ad hoc networks. In: Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies, Elsevier, vol. 32, pp. 174–181

  11. Abdelhak B, Abdelhak B and Saad H 2013 Survey of clustering schemes in mobile ad hoc networks, Commun. Netw. pp 8–14

  12. Khalid H, Abdul H Abdullah, Khalid M Awan, Faraz Ahsan, Akhtab Hussain and Johor Bahru 2013 Cluster head election schemes for WSN and MANET: A survey. World Appl. Sci. J. 23(5): 611–620

  13. Mohd Junedul Haque, Mohd Muntjir and Hussain A S 2015 A comparative survey for computation of cluster-head in MANET. Int. J. Comput. Appl. 118 (3): 6–9

  14. Fan P, Li G, Kai Cai and Letaief K B 2007 On the geometrical characteristic of wireless ad-hoc networks and its application in network performance analysis. IEEE Trans. Wireless Commun. 6(4): 1256–1265

  15. Stojmenovic I, Ruhil A P and Lobiyal D K 2006 Voronoi diagram and convex hull based geocasting and routing in wireless networks. Wireless Commun. Mobile Comput. 6: 247–258

  16. Ngai W K, Kao B, Chui C K, Cheng R, Chau M and Yip K Y 2006 Efficient clustering of uncertain data. Proceedings of ICDM pp. 436–445

  17. Renu D, Manju Khari and Yudhvir Singh 2012 Survey of trust schemes on ad-hoc network. Int. J. AdHoc Netw. Syst. springer, 2 pp. 170–180

  18. Manju Khari and Yudhvir Singh 2012 Different ways to achieve trust in MANET. Int. J. AdHoc Netw. Syst. 2(2): 1–10

  19. Jingwei H and David N 2009 A calculus of trust and its application to pki and identity management. In: Proceedings of 8th Symposium on Identity and Trust on the Internet, pp. 23–37

  20. Liu K, Abu-Ghazaleh N and Kang K 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distributed Comput. 67: 215–228

  21. Ferdous R, Muthukkumarasamy V and Sithirasenan E 2011 Trust-based cluster head selection algorithm for mobile ad hoc networks. In: Proceedings of International Joint Conference IEEE TrustCom pp. 589–596

  22. Cho J H, Chan K S, Chen I R 2013 Composite trust-based public key management in mobile ad hoc networks. ACM 28th Symposium on Applied Computing, Coimbra, Portugal, pp 1949–1956

  23. Wei Z, Tang H, Richard Yu, Wang M and Mason P 2014 Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Vehicular Technol. 63(9): 4647–4658

  24. Ing-Ray Chen, Jia Guo, Fenye Bao and Jin-Hee Cho 2014 Trust management in mobile ad hoc networks for bias minimization and application performance maximization ad hoc networks. Ad hoc networks. Elsevier, vol. 19, pp. 59–74

  25. Deering S, Estrin D, Farinacci D, Jacobson V, Helmy A and Wei L 1997 Protocol independent MulticastVersion 2, dense mode specification. Internet Draft, ftp://ietf.org/internet-drafts/draft-ietf-idmr-pim-dm-spec-05.txt

  26. Mohammad M Qabajeh, Aisha H Abdalla, Othman O Khalifa and Liana K Qabajeh2015 A survey on scalable multicasting in mobile ad hoc networks. Wireless Personal Commun. 80(1): 369–393

  27. Kanchan D and Asutkar G M 2016 Enhancement in the performance of routing protocols for wireless communication using clustering, encryption, and cryptography. Artificial intelligence and evolutionary computations in engineering systems, advances in intelligent systems and computing, vol. 394, pp 547–558.

  28. Jormakka J and Jormakka H 2014 Revocation of user certificates in a military ad hoc network. Brazilian J. Inform. Security Cryptogr. 1(1): 1–3

  29. Yki K and Mikko S 2014 Survey of certificate usage in distributed access control. Computers & security, Elsevier vol 44, pp 16–32

  30. Wei Liu, Hiroki Nishiyama, Nirwan Ansari and Nei Kato 2011 A study on certificate revocation in mobile ad hoc networks. IEEE International Conference on Communications (ICC), pp 1–5

  31. Mohammad Masdari and Javad P B 2012 Distributed certificate management in mobile ad hoc networks. Int. J. Appl. Inform. Syst. 4(6): 33–40

  32. Mohamed M E A Mahmoud, Jelena Misic, Kemal Akkaya and Xuemin Shen 2015 Investigating public-key certificate revocation in smart grid. IEEE Internet Things J. 2: 490–503

  33. Mohammad Masdari, Sam J and Jamshid B 2015a Improving OCSP-based certificate validations in wireless ad hoc networks. Wireless Personal Commun., 82 (1): 377–400

  34. Mohammad Masdari, Sam J, Jamshid B and Ahmad Khadem-Zadeh 2015b Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks. Computers & security, Elsevier, vol 49, pp. 17–27

  35. Liu W, Nishiyama H, Ansari N, Yang J and Kato N 2013 Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distributed Syst. 24(2): 239–249

  36. Luo H, Kong J, Zerfos P, Lu S and Zhang L 2004 URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12(6): 1049–1063

  37. Taisuke Izumi, Tomoko Izumi, Hirotaka Ono and Koichi Wada 2015 Approximability of minimum certificate dispersal with tree structures. Theoretical computer science, Elsevier, vol. 591, pp 5–14

  38. Park K, Nishiyama H, Ansari N and Kato N 2010 Certificate revocation to cope with false accusations in mobile ad hoc networks. Proceedings of IEEE 71st Vehicular Technology Conference pp 1–5

  39. Raya M, Manshaei M H, Felegyhazi M and Hubaux J P 2008 Revocation games in ephemeral networks. Proceedings of ACM CCS

  40. Mawloud Omar, Hamida B, Lydia Mammeri, Amel Taalba and Abdelkamel T 2016 Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J. Netw. Comput. Appl., Elsevier, 62: 153–162

  41. Bettstetter C and Wagner C 2002 The spatial node distribution of the random waypoint mobility model. Proceedings German Workshop on Mobile Ad Hoc Networks (WMAN)

  42. Bai F and Helmy A 2004 A survey of mobility modeling and analysis in wireless ad hoc networks. Wireless ad hoc and sensor networks. Kluwer academic publishers

  43. Aschenbruck N, ErnstR, Gerhards-Padilla E and Schwamborn M 2010 BonnMotion – A mobility scenario generation and analysis tool. In: Proceedings of the 3rd International Conference on Simulation Tools andTechniques

  44. Wasef A and Shen X 2009 EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Tech. 58(9): 5214–5224

  45. Krikke 2005 T-engine: Japan’s ubiquitous computing architecture is ready for prime time. IEEE Pervasive Comput. 4(2): 4–9

  46. Noboru K and Ken S 2010 Ubiquitous ID: Standards for ubiquitous computing and the internet of things. IEEE Pervasive Comput. 9(4): 98–101

  47. Khan M F F and Sakamura K 2015 Tamper-resistant security for cyber-physical systems with eTRON architecture. IEEE International Conference on Data Science and Data Intensive Systems, Sydney, NSW, pp 196–203

Download references

Acknowledgment

This research is supported by All India Council for Technical Education (AICTE), Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V S Janani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Janani, V.S., Manikandan, M.S.K. Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks. Sādhanā 41, 1135–1154 (2016). https://doi.org/10.1007/s12046-016-0545-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12046-016-0545-0

Keywords

Navigation