Skip to main content
Log in

CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: MobiHoc’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002)

    Chapter  Google Scholar 

  2. Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 191–199. IEEE Press, New York (2005)

    Chapter  Google Scholar 

  3. Li, W., Parker, J., Joshi, A.: Security through collaboration in manets. In: Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), pp. 696–714. Springer, Berlin (2008)

    Google Scholar 

  4. Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM’09, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2009)

    Chapter  Google Scholar 

  5. Li, W., Joshi, A., Finin, T.: Policy-based malicious peer detection in ad hoc networks. In: Proceedings of the International Conference on Computational Science and Engineering, CSE’09, vol. 3, pp. 76–82. IEEE Comput. Soc., Los Alamitos (2009)

    Chapter  Google Scholar 

  6. Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mobile Networks and Applications (MONET) 17(3), 342–352 (2012)

    Article  Google Scholar 

  7. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283. ACM, New York (2000)

    Google Scholar 

  8. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000)

    Google Scholar 

  9. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe’04: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004)

    Google Scholar 

  10. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006)

    Chapter  Google Scholar 

  11. Parker, J., Patwardhan, A., Joshi, A.: Cross-layer analysis for detecting wireless misbehavior. In: Proceedings of the Third IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 6–9. IEEE Press, New York (2006)

    Chapter  Google Scholar 

  12. Buchegger, S., Le Boudee, J.-Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005)

    Article  Google Scholar 

  13. Yau, P.-W., Mitchell, C.J.: Security vulnerabilities in ad hoc networks. In: Proceedings of the 7th International Symposium on Communication Theory and Applications, pp. 99–104 (2003)

    Google Scholar 

  14. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic, Dordrecht (2002)

    Google Scholar 

  15. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  16. Deng, H., Zeng, Q.-A., Agrawal, D.: Svm-based intrusion detection system for wireless ad hoc networks. In: Proceedings of 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall vol. 3, pp. 2147–2151 (2003). 2003

    Chapter  Google Scholar 

  17. Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for aodv. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134. ACM, New York (2003)

    Chapter  Google Scholar 

  18. Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147. ACM, New York (2003)

    Chapter  Google Scholar 

  19. Li, W., Joshi, A., Finin, T.: Atm: automated trust management for mobile ad hoc networks using support vector machine. In: 12th IEEE International Conference on Mobile Data Management (MDM), pp. 291–292 (2011)

    Chapter  Google Scholar 

  20. Li, W., Joshi, A., Finin, T.: Sat: an svm-based automated trust management system for mobile ad-hoc networks. In: 2011 IEEE Military Communications Conference (MILCOM2011), pp. 1102–1107 (2011)

    Google Scholar 

  21. Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom’03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM, New York (2003)

    Google Scholar 

  22. Xue, Y., Nahrstedt, K.: Providing fault-tolerant ad hoc routing service in adversarial environments. Wirel. Pers. Commun. 29(3–4), 367–388 (2004)

    Article  Google Scholar 

  23. Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In: SASN’06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 91–100. ACM, New York (2006)

    Chapter  Google Scholar 

  24. Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for mobile ad-hoc networks. In: Proceedings of P2PEcon (2003)

    Google Scholar 

  25. He, Q., Wu, D., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC’04, vol. 2, pp. 825–830 (2004)

    Google Scholar 

  26. Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003)

    Google Scholar 

  27. Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous’06, pp. 1–8 (2006)

    Chapter  Google Scholar 

  28. Ren, Y., Boukerche, A.: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In: Proceedings of 2009 IEEE International Conference on Communications, ICC’09, pp. 1–5 (2009)

    Chapter  Google Scholar 

  29. Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management 2, 333–360 (1994)

    Article  Google Scholar 

  30. Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003 (2003)

    Google Scholar 

  31. Godik, S., Moses, T.: Oasis Extensible Access Control Markup Language (xacml) (2002)

  32. Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007)

    Article  Google Scholar 

  33. Google: Android Sensors. http://developer.android.com/reference/android/hardware/Sensor.html

  34. Eriksson, J., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: The Sixth Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2008), Breckenridge, USA (2008)

    Google Scholar 

  35. Carroll, J.J., Dickinson, I., Dollin, C., Reynolds, D., Seaborne, A., Wilkinson, K.: Jena: implementing the semantic web recommendations. In: Proceedings of the 13th International World Wide Web Conference, WWW 2004, pp. 74–83. ACM, New York (2004)

    Google Scholar 

  36. Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11, 1–21 (1969)

    Article  Google Scholar 

  37. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    MATH  Google Scholar 

  38. Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: a library for parallel simulation of large-scale wireless networks. ACM SIGSIM Simulation Digest 28(1), 154–161 (1998)

    Article  Google Scholar 

  39. Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management, MDM’10, pp. 112–121. IEEE Comput. Soc., Los Alamitos (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenjia Li.

Additional information

Communicated by Mohamed Mokbel.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, W., Joshi, A. & Finin, T. CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies. Distrib Parallel Databases 31, 353–376 (2013). https://doi.org/10.1007/s10619-012-7113-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-012-7113-3

Keywords

Navigation