Skip to main content

Security and Trust Management in MANET

  • Conference paper
Information Technology and Mobile Communication (AIM 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 147))

Abstract

A mobile adhoc network (MANET) is a network which does not have any centralized control. Security and trust management are paramount concern for these networks for efficient data transfer among the participating nodes. In this paper, we propose an efficient security and trust management based algorithm for MANET. The proposed algorithm consists of three steps: initialization, data transmission, and detection. The time based nonce is generated at different time interval which gives effectiveness to the proposed approach in the sense that it is not easy to detect the generated nonce. The proposed approach is quite effective with the earlier approaches to detect the security threat in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Raimundo, J., Macêdo, A., Assis Silva, F.M.: The mobile groups approach for the coordination of mobile agents. J.Parallel Distributed Computing 65, 275–288 (2005)

    Article  Google Scholar 

  2. Eriksson, J., Krishnamurthy, S., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack. In: ICNP (2006)

    Google Scholar 

  3. Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organising mobile ad hoc networks. In: Mobile Networks and Applications (2003)

    Google Scholar 

  4. Kumar, N., Patel, R.B.: MASLKE: mobile agent based secure location aware key establishment in sensor networks. In: Proc. ICON 2008, New Delhi, India (2008)

    Google Scholar 

  5. Zhang, Y., Lee, W.: Instruction Detection in wireless adhoc networks. In: Proceedings of ACM Mobicom, Boston, USA (2000)

    Google Scholar 

  6. Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)

    Article  Google Scholar 

  7. Rescorla, E.: Diffie-Hellman Key Agreement Method, RFC 2631, IETF Network Working Group, http://www.ietf.org/rfc/rfc2631.txt

  8. Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Bennett, C.H., Gill, J.: Relative to a Random Oracle A, P^A != NP^A != co-NP^A with Probability 1. SIAM Journal on Computing 10(1), 96–113

    Google Scholar 

  10. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM (2004)

    Google Scholar 

  11. Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: Proceedings of the 11th Network and Distributed System Security Symposium (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Singh, A., Maheshwari, M., Nikhil, Kumar, N. (2011). Security and Trust Management in MANET. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds) Information Technology and Mobile Communication. AIM 2011. Communications in Computer and Information Science, vol 147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20573-6_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20573-6_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20572-9

  • Online ISBN: 978-3-642-20573-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics