The Florida State University College of Arts and Sciences Trust Management in Mobile Wireless Networks: Security and Survivability
نویسندگان
چکیده
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the selfish node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic ad hoc nature, these networks are particularly vulnerable to security threats. The security of such systems is, to a large extent, based on trust associations. There are several ways in which trust can be supported in a network system. The way we adopt is to establish a secure public key management infrastructure (PKI). This enables basic cryptographic functionalities, such as integrity, privacy, etc. However, due to the dynamic character of a wireless mobile network and its ad hoc topology changes, the trust associations cannot depend on any pre-established trust relations and must support a flexible, uncertain and incomplete trust model. One of our main goals in this dissertation is to analyze the distributed nature of trust in wireless mobile networks and to consider approaches that manage trust based only on locally available information. In our analysis for this problem we use the traditional Byzantine attack model. After reviewing the trust models proposed in the literature we propose an extension that supports a distributed trust management infrastructure. In this model the trust is distributed horizontally via multiple disjoint trust flows. Compared to the traditional hierarchical trust distribution, our approach is appropriate for dynamic wireless systems for which there are no central trust authorities. A second goal is to manage trust based on the good behavior of nodes. Mobile wireless networks rely heavily on node collaboration. However, since the nodes are often battery
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملQuantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
Trust and Trust Management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. Recent spate of national and global high-impact Cyber Security compromises, threats, vulnerabilities, and exposures leads to fundamental questioning of Trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing Distrust. It is ...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کامل