Abstract
A mobile adhoc network (MANET) is a network which does not have any centralized control. Security and trust management are paramount concern for these networks for efficient data transfer among the participating nodes. In this paper, we propose an efficient security and trust management based algorithm for MANET. The proposed algorithm consists of three steps: initialization, data transmission, and detection. The time based nonce is generated at different time interval which gives effectiveness to the proposed approach in the sense that it is not easy to detect the generated nonce. The proposed approach is quite effective with the earlier approaches to detect the security threat in MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Raimundo, J., Macêdo, A., Assis Silva, F.M.: The mobile groups approach for the coordination of mobile agents. J.Parallel Distributed Computing 65, 275–288 (2005)
Eriksson, J., Krishnamurthy, S., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack. In: ICNP (2006)
Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organising mobile ad hoc networks. In: Mobile Networks and Applications (2003)
Kumar, N., Patel, R.B.: MASLKE: mobile agent based secure location aware key establishment in sensor networks. In: Proc. ICON 2008, New Delhi, India (2008)
Zhang, Y., Lee, W.: Instruction Detection in wireless adhoc networks. In: Proceedings of ACM Mobicom, Boston, USA (2000)
Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)
Rescorla, E.: Diffie-Hellman Key Agreement Method, RFC 2631, IETF Network Working Group, http://www.ietf.org/rfc/rfc2631.txt
Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2003)
Bennett, C.H., Gill, J.: Relative to a Random Oracle A, P^A != NP^A != co-NP^A with Probability 1. SIAM Journal on Computing 10(1), 96–113
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM (2004)
Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: Proceedings of the 11th Network and Distributed System Security Symposium (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Singh, A., Maheshwari, M., Nikhil, Kumar, N. (2011). Security and Trust Management in MANET. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds) Information Technology and Mobile Communication. AIM 2011. Communications in Computer and Information Science, vol 147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20573-6_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-20573-6_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20572-9
Online ISBN: 978-3-642-20573-6
eBook Packages: Computer ScienceComputer Science (R0)