STCM: Secured trust-based communication method in vulnerable mobile adhoc network

Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequ...

詳細記述

保存先:
書誌詳細
主要な著者: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad
フォーマット: Conference or Workshop Item
言語:English
English
English
出版事項: Springer 2017
主題:
オンライン・アクセス:http://irep.iium.edu.my/57640/1/57640_STCM-%20Secured%20Trust-Based%20Communication.pdf
http://irep.iium.edu.my/57640/2/57640_STCM-%20Secured%20Trust-Based%20Communication_SCOPUS.pdf
http://irep.iium.edu.my/57640/13/57640%20STCM%20-%20Secured%20trust-based%20communication%20WOS.pdf
http://irep.iium.edu.my/57640/
https://link.springer.com/chapter/10.1007/978-981-10-1721-6_17
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
その他の書誌記述
要約:Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequently used technique to ensure security in communication of mobile Adhoc network; however, there are associated issues with cryptographic implementation in security. Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. The proposed system applies a novel design of control message that uses simple tree to maintain certificates and performs authentication of nodes based on trust factor of node with respect to identity and behavioral pattern of the mobile nodes. The outcome of the study shows better security and communication performance in comparison to frequently used routing approaches.