Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Citation
Kalyani Handal, Prof. Moresh mukhedkar, Prof. Dr. P. H. Patil, Sadaf Mujawar"Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning", International Journal of Engineering Trends and Technology (IJETT), V60(4),209-214 June 2018. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Mobile Ad Hoc Networks and Applications are formed by wireless hosts Without using a pre-existing infrastructure. This paper presents the design and implementation of a policy enforcing mechanism based on Satem, a kernel-level trusted execution monitor built on top of the Trusted Platform Module. Each application or protocol has an associated policy. Two instances of an application running on different nodes may engage in communication only if these nodes enforce the same set of policies for both the application and the underlying protocols used by the application. In this way, nodes can form trusted application centric networks.
Reference
[1] Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning Zhexiong Wei, Helen Tang, Member, IEEE, F. Richard Yu, Senior Member, IEEE, Maoyu Wang, and Peter Mason
[2] F. R. Yu, Cognitive Radio Mobile Ad Hoc Networks. New York, NY, USA: Springer-Verlag, 2011.
[3] J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc Networks: Current Status and Future Trends. Boca Raton, FL, USA: CRC, 2011.
[4] Q. Guan, F. R. Yu, S. Jiang, and V. Leung, “Joint topology control and authentication design in mobile ad hoc networks with cooperative communications,” IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674–2685, Jul. 2012.
[5] F. R. Yu, H. Tang, S. Bu, and D. Zheng, “Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks,” EURASIP J. Wireless Commun. Netw., vol. 2013, pp. 188–190, Jul. 2013.
[6] H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012.
[7] Juan-Carlos Ruiz, Jesús Friginal, David de-Andrés, Pedro Gil : Black Hole Attack Injection in Ad hoc Networks www.ece.cmu.edu/~koopman/dsn08/fastabs/dsn08fastabs_ruiz.pdf
[8] Hardjono, ``Security In Wireless LANS And MANS,`` Artech House Publishers 2005.
[9] W.Stallings, ``Cryptography and Network Security 4th Ed,`` Prentice Hall , 2005,PP. 58-309
[10] Milind Mathur, Ayush Kesarwani,“ Comparison between DES , 3DES , RC2 , RC6 , Blowfish and AES ”,Proceedings of National Conference on New Horizons in IT - NCNHIT 2013.
[11] Manpreet Kaur, Ms. Sukhpreet Kaur, “ Survey of Various Encryption Techniques for Audio Data”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 5, May 2014.
[12] Moresh M. Mukhedkar, Dr. Uttam D. Kolekar, “ A Comprehensive Evaluation of Nature Inspired Routing Algorithms for Mobile Ad Hoc Network : DEA and BCA”, Internattional Journal on Future Revolution in Computer Science and Communication Engineering (IFRSCE) Vol. 4, issue 4, pp. 406-411, April 2018.
[13] Moresh M. Mukhedkar, Dr. Uttam D. Kolekar, “Performance analysis of Performance analysis of Various Nature Inspired Routing Algorithms for Mobile Ad Hoc Network”, Journal of Engineering Practices and Futuristic Technologies(JEpFT) pp. 01-06, Feb 2018.
[14] Moresh M. Mukhedkar, Dr. Uttam D. Kolekar, “A Review on Development of Real Time Algorithm using Mobile Ad-Hoc Network for disaster Management”, International Journal of Computer Science and Network (IJCSN), Vol. 5, issue 3, pp. 526-534, June 2016.
[15] Moresh M. Mukhedkar, Dr. Uttam. D. Kolekar. “Implementation of Real Time Secure Routing Protocol for Mobile Ad hoc Network and AES for Disaster Affected Area” In Proceedings of the IEEE International Conference on Computing Methodologies and Communication (ICCMC 2017), 978-1-5090-4890-8, pp. 491-496, 18-19 July, 2017.
Keywords
MANET, Security, Trust Management, Route Discovery, Trust Evaluation.