STCM: Secured trust-based communication method in vulnerable mobile adhoc network

Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequ...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad
Format: Conference or Workshop Item
Language:English
English
English
Published: Springer 2017
Subjects:
Online Access:http://irep.iium.edu.my/57640/1/57640_STCM-%20Secured%20Trust-Based%20Communication.pdf
http://irep.iium.edu.my/57640/2/57640_STCM-%20Secured%20Trust-Based%20Communication_SCOPUS.pdf
http://irep.iium.edu.my/57640/13/57640%20STCM%20-%20Secured%20trust-based%20communication%20WOS.pdf
http://irep.iium.edu.my/57640/
https://link.springer.com/chapter/10.1007/978-981-10-1721-6_17
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequently used technique to ensure security in communication of mobile Adhoc network; however, there are associated issues with cryptographic implementation in security. Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. The proposed system applies a novel design of control message that uses simple tree to maintain certificates and performs authentication of nodes based on trust factor of node with respect to identity and behavioral pattern of the mobile nodes. The outcome of the study shows better security and communication performance in comparison to frequently used routing approaches.