Abstract
As they are used to create open communities, Mobile Ad hoc NETworks (MANETs) are not favourable environments to establish trust, which is necessary to provide security. Multipath routing mechanisms within infrastructureless networks environment seems appropriate and useful to enhance security protection. In fact, the level of trust can be increased so as many of potential security attacks are detected, revealed and stopped. Nevertheless an excessive control overhead is always generated. In this paper, we propose a global framework that integrates a set of concepts and mechanisms aiming at enhancing security in highly dynamic decentralized ad hoc networks. Our solution focuses on authentication, routing securing, trust management with reliable estimation of trust. A large panoply of attacks are prevented using our various mechanisms.
Chapter PDF
Similar content being viewed by others
6 References
D. Gambetta, “Can we trust trust?”, Trust, Making and Breaking Cooperative Relations. basil Blackwell (1990) p. 213–237
J. Kong, P. Zerfos, H. Luo, S. LU and L. Zhang. “Providing robust and ubiquitous security support for mobile ad-hoc networks”, in Proc. of the 9th IEEE International Conference on Network Protocols, 2001
P. Zimmermann. “The official PGP user’s guide”. MIT Press 1995
S. Capku, L. Buttyan, and J.-P Hubaux. “Small worlds in security systems: an analysis of the pgp certificate graph”, in Proc. of the 2002 workshop on New security paradigms, 28–35, 2002
T. Li, Z. Wan, F. Bao, K. Ren, R. H. Deng, K. Kim, “Highly reliable trust establishment scheme in ad hoc networks”, Computer Networks 45 (2004): 687699
G. Montenegro and C. Castelluccia. “Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses”. in Proc. of the Network and Distributed System Security Symposium (NDSS’02), 2002
J.R. Douceur, “The Sybil Attack”, in Proc. of the 1st International Workshop on Peer-to-Peer Systems, 2002
S. Yi, R. Kravets, “Composite Key Management For Ad Hoc Networks”, in Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), 2004
Y.-C. Hu, A. Perrig, and D. B. Johnson. “Ariadne: A secure on-demand routing protocol for ad hoc networks”. In MOBICOM, 2002.
K. Sanzgiri, D. LaFlamme, B. Dahill, B. Neil Levine, C. Shields, E. M. Belding-Royer, “Authenticated Routing for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, vol. 23”, no. 3, march 2005
R. Mavropodi, P. Kotzanikolaou, C. Douligeris, “Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks”, in Springer WWIC 2005, p.269–278, 2005
T.M. Chen, V. Venkataramanan, “Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks”, IEEE Internet Computing Volume: 9 Issue: 6 Date: Nov.–Dec. 2005
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Toubiana, V., Labiod, H. (2006). ASMA : Towards Adaptive Secured Multipath in MANETs. In: Pujolle, G. (eds) Mobile and Wireless Communication Networks. MWCN 2006. IFIP The International Federation for Information Processing, vol 211. Springer, Boston, MA . https://doi.org/10.1007/978-0-387-34736-3_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-34736-3_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34634-2
Online ISBN: 978-0-387-34736-3
eBook Packages: Computer ScienceComputer Science (R0)