A Cognitive Trust Model for Access Control Framework in MANET

  • Soumya Maity
  • Soumya K. Ghosh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)


The proliferation in installation of mobile ad hoc networks (MANET) in different fields of application demands attention in enforcement of trust-based security access control. The decentralized and mobile characteristics of MANET, restrains the traditional access control mechanisms to fit into it. In a MANEt, all peers or nodes are not equally trustworthy to request for a service or to transmit a packet. In decentralized system, concept of social trust has been introduced to compute how trustworthy the peer is. A number of trust models have been proposed by the researchers in the past decade, but still exists a lack of proper integration of trust-based access control with mission-critical MANET. In this paper, we propose an access control framework equipped with cognitive trust-based model. The framework integrates aspect of cognition based trust and reputation model, certification based participation schemes and an overall security access control mechanism for MANET nodes. We argue our proposed scheme is realistic and our approach preserves network properties of mobile ad hoc networks and individual characteristics of the nodes.


Trust model Access control Mobile ad hoc networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE (2002)Google Scholar
  2. 2.
    Balachandran, R.K., Ramamurthy, B., Zou, X., Vinodchandran, N.V.: CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: 2005 IEEE International Conference on Communications, ICC 2005, vol. 2, pp. 1123–1127. IEEE (2005)Google Scholar
  3. 3.
    Maity, S., Bera, P., Ghosh, S.K.: An access control framework for semi-infrastructured Ad hoc networks. In: 2010 2nd International Conference on Computer Technology and Development, ICCTD, pp. 708–712. IEEE (2010)Google Scholar
  4. 4.
    Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, p. 54. Australian Computer Society, Inc. (2004)Google Scholar
  5. 5.
    Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for p2p file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS 2005, p. 302c. IEEE (2005)Google Scholar
  6. 6.
    Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 1–18. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  7. 7.
    Li, X., Jia, Z., Zhang, P., Wang, H.: A trust-based multipath routing framework for Mobile Ad hoc NETworks. In: 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery, FSKD, vol. 2, pp. 773–777. IEEE (2010)Google Scholar
  8. 8.
    Zhang, C., Zhu, X., Song, Y., Fang, Y.: A formal study of trust-based routing in wireless ad hoc networks. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)Google Scholar
  9. 9.
    Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems, KIMAS 2005. Citeseer (2005)Google Scholar
  10. 10.
    Li, W., Joshi, A.: Security Issues in Mobile Ad Hoc Networks-A Survey (2008)Google Scholar
  11. 11.
    Kärpijoki, V.: Security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, Seminar on Network Security. Citeseer (2000)Google Scholar
  12. 12.
    International Standards for Standardization. ISO 7498-2:1989 (2000),
  13. 13.
    Gordon, R.L.: Trust establishment in mobile ad hoc networks (2008)Google Scholar
  14. 14.
    Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM (2004)Google Scholar
  15. 15.
    Alicherry, M., Keromytis, A.D., Stavrou, A.: Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 41–50. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Alicherry, M., Keromytis, A.D.: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. In: International Conference on Network and System Security. Citeseer (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Soumya Maity
    • 1
  • Soumya K. Ghosh
    • 1
  1. 1.School of Information TechnologyIndian Institute of Technology KharagpurIndia

Personalised recommendations