Abstract
Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.
Similar content being viewed by others
References
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: MobiHoc’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002)
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 191–199. IEEE Press, New York (2005)
Li, W., Parker, J., Joshi, A.: Security through collaboration in manets. In: Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 696–714. Springer, Berlin (2008)
Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM’09, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2009)
Li, W., Joshi, A., Finin, T.: Policy-based malicious peer detection in ad hoc networks. In: Proceedings of the International Conference on Computational Science and Engineering, CSE’09, vol. 3, pp. 76–82. IEEE Comput. Soc., Los Alamitos (2009)
Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mobile Networks and Applications (MONET) 17(3), 342–352 (2012)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283. ACM, New York (2000)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000)
Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe’04: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006)
Parker, J., Patwardhan, A., Joshi, A.: Cross-layer analysis for detecting wireless misbehavior. In: Proceedings of the Third IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 6–9. IEEE Press, New York (2006)
Buchegger, S., Le Boudee, J.-Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005)
Yau, P.-W., Mitchell, C.J.: Security vulnerabilities in ad hoc networks. In: Proceedings of the 7th International Symposium on Communication Theory and Applications, pp. 99–104 (2003)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic, Dordrecht (2002)
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Deng, H., Zeng, Q.-A., Agrawal, D.: Svm-based intrusion detection system for wireless ad hoc networks. In: Proceedings of 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall vol. 3, pp. 2147–2151 (2003). 2003
Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for aodv. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134. ACM, New York (2003)
Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147. ACM, New York (2003)
Li, W., Joshi, A., Finin, T.: Atm: automated trust management for mobile ad hoc networks using support vector machine. In: 12th IEEE International Conference on Mobile Data Management (MDM), pp. 291–292 (2011)
Li, W., Joshi, A., Finin, T.: Sat: an svm-based automated trust management system for mobile ad-hoc networks. In: 2011 IEEE Military Communications Conference (MILCOM2011), pp. 1102–1107 (2011)
Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom’03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM, New York (2003)
Xue, Y., Nahrstedt, K.: Providing fault-tolerant ad hoc routing service in adversarial environments. Wirel. Pers. Commun. 29(3–4), 367–388 (2004)
Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 91–100. ACM, New York (2006)
Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon (2003)
He, Q., Wu, D., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC’04, vol. 2, pp. 825–830 (2004)
Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003)
Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous’06, pp. 1–8 (2006)
Ren, Y., Boukerche, A.: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In: Proceedings of 2009 IEEE International Conference on Communications, ICC’09, pp. 1–5 (2009)
Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management 2, 333–360 (1994)
Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003 (2003)
Godik, S., Moses, T.: Oasis Extensible Access Control Markup Language (xacml) (2002)
Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007)
Google: Android Sensors. http://developer.android.com/reference/android/hardware/Sensor.html
Eriksson, J., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: The Sixth Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2008), Breckenridge, USA (2008)
Carroll, J.J., Dickinson, I., Dollin, C., Reynolds, D., Seaborne, A., Wilkinson, K.: Jena: implementing the semantic web recommendations. In: Proceedings of the 13th International World Wide Web Conference, WWW 2004, pp. 74–83. ACM, New York (2004)
Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11, 1–21 (1969)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: a library for parallel simulation of large-scale wireless networks. ACM SIGSIM Simulation Digest 28(1), 154–161 (1998)
Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management, MDM’10, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2010)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Mohamed Mokbel.
Rights and permissions
About this article
Cite this article
Li, W., Joshi, A. & Finin, T. CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies. Distrib Parallel Databases 31, 353–376 (2013). https://doi.org/10.1007/s10619-012-7113-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10619-012-7113-3