A Formal Environment for MANET Organization and Security

  • Aida Ben Chehida Douss
  • Ryma Abassi
  • Nihel Ben Youssef
  • Sihem Guemara El Fatmi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9476)

Abstract

A Mobile Ad-hoc Network (MANET) allows the communication of autonomous nodes without any preexistent network infrastructure. This main characteristic may introduce several vulnerabilities which can be exploited by malicious nodes. Thus, one of the basic requirements for the well behavior of such network is to detect and isolate such nodes. Recently, we proposed a reputation based trust management scheme detecting and isolating malicious nodes. This scheme was built upon a specific clustering algorithm baptized MCA (Mobility-based Clustering Approach) and based on two phases: the setting up and the maintenance. In the setting up phase, stable clusters are generated with one-hop members and elected cluster-heads (CHs). In the maintenance phase, the organization of the clusters is maintained in presence of mobility using adequate algorithms. The whole proposition was called TMCA (Trust based MCA) and was also extended with a delegation process resulting a proposition baptized DTMCA (Delegation process TMCA). Once DTMCA is defined, we have found important to validate formally each one of its components in order to avoid any conflict, lack or misbehaving situations. This process requires in a first step a formal specification. This is our main concern in this paper where we propose in a first part a formal specification using inference systems based on logical rules. Two inference systems are proposed. The first one handles the MCA maintenance phase and the second one specifies the TMCA scheme on which the delegation process is integrated. A formal validation using these inference systems is proposed in a second step in order to prove the soundness and the completeness of the various propositions.

Keywords

MANET security Clustering Inference system Formal validation Soundness Completeness 

References

  1. 1.
    Sharma, S.K., Kumar, R., Gangwar, A., Pakhre, K.: Routing protocols and security issues in MANET: a survey. Int. J. Emerg. Technol. Adv. Eng. (IJETAE) 4(4), April 2014Google Scholar
  2. 2.
    Lindsay, P.A.: “Specification and validation of a network security policy model”, Technical report. 97–05, Software Verification Research Centre, the University of Queensland, April 1997Google Scholar
  3. 3.
    IEEE Guide to Software Requirements Specification. ANSI / IEEE Std 830 (1998)Google Scholar
  4. 4.
    Abassi, R., Guemara El Fatmi, S.: A novel validation method for firewall security policy. J. Inf. Assur. Secur. 4, 329–337 (2009)Google Scholar
  5. 5.
    Kumar, B.P., Sekhar, P.C., Papanna, N., Bhushan, B.B.: A survey on MANET security challenges and routing protocol. Int. J. Comput. Technol. Appl. (IJCTA) 4, 248–256 (2013)Google Scholar
  6. 6.
    Nassuora, A.B., Hussein, A.R.H.: CBPMD: a new weighted distributed clustering algorithm for mobile Ad hoc networks (MANETs). Am. J. Sci. Res. 22, 43–56 (2011). ISSN, 1450–223XGoogle Scholar
  7. 7.
    Youssef, N.B., Bouhoula, A., Jasquemard, F.: Automatic verification of conformance of firewall configurations to security policies. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2009, Sousse, Tunisia (2009)Google Scholar
  8. 8.
    El Hassani, A.A., El Kalam, A.A., Bouhoula, A., Abassi, R., Ouahman, A.A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Aida Ben Chehida Douss
    • 1
  • Ryma Abassi
    • 1
  • Nihel Ben Youssef
    • 2
  • Sihem Guemara El Fatmi
    • 1
  1. 1.Higher School of Communication, Sup’ComISI University of Carthage TunisTunisTunisia
  2. 2.Higher Institute of Computer ScienceISI University of Carthage TunisTunisTunisia

Personalised recommendations