TEAM: Trust enhanced security architecture for mobile ad-hoc networks

Venkat Balakrishnan*, Vijay Varadharajan, Uday Tupakula, Phillip Lucs

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

17 Citations (Scopus)
48 Downloads (Pure)

Abstract

Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed for MANET in the areas of key management, secure routing, nodal cooperation, and trust management. Nevertheless, MANET lacks a unified architecture to take advantage of the deployed security models. In this paper, we propose Trust Enhanced security Architecture for MANET (TEAM), in which a trust model is overlaid on the following security models - key management mechanism, secure routing protocol, and cooperation model. We briefly present the operation of our architecture and then we detail the system operation of our novel trust and cooperation model, which we call as Secure MANET Routing with Trust Intrigue (SMRTI) and fellowship respectively. SMRTI captures the evidence of trustworthiness for other nodes from the security models, and in return assists them to make better security decisions. Unlike related trust models, SMRTI captures recommendations in such a way that it eliminates both freeriding and honest-elicitation problems. In comparison with related cooperation models, fellowship model defends against both flooding and packet drop attacks. It can efficiently identify and isolate both malicious and selfish nodes that fail to share the communication channel or forward packets for other nodes. Furthermore, our models do not rely on any centralized authority or tamper-proof hardware. Simulation results confirm that our models enhance the performance of TEAM.

Original languageEnglish
Title of host publicationICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks
EditorsAruna Jayasuriya
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages182-187
Number of pages6
ISBN (Print)1424412307, 9781424412303
DOIs
Publication statusPublished - 2007
Event15th IEEE International Conference on Networks, ICON 2007 - Adelaide, SA, Australia
Duration: 19 Nov 200721 Nov 2007

Other

Other15th IEEE International Conference on Networks, ICON 2007
Country/TerritoryAustralia
CityAdelaide, SA
Period19/11/0721/11/07

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of the 15th IEEE international conference on networks (2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'TEAM: Trust enhanced security architecture for mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this