Soft-Computing Based Trust Management Framework for Group Key Management in MANETs

We can realize instant joint group communication by forming Mobile Ad Hoc Networks without demanding any pre-plan or pre-existing infrastructure setup. Conversely, the curbs of these networks such as unreliable wireless medium, unpredictable topology, no central administration, fuel the compulsion of a key based cryptographic algorithm to defend data traffic. In this perspective, substantial research work has been done in the last decade or so and ascertained that the trust based frameworks for group key management deliver superior performance than others. Since the nodes in ad hoc networks have limited computing resources, the overall performance of the system depends on how effectively and securely designed the system. This encourages us to work on a framework which consumes less computing power and also invulnerable to internal as well as external attacks. We propose a framework which reduces the network resource consumption for the trust request and collection using game theory concept. The energy of the wireless nodes are significantly saved by choosing the novel strategy called as finding optimal set of remote nodes to send the response for trust request using game theory. Choosing local optimal at each stage eventually leads to global optimal. Later, synthesize the collected trust and handle the attacks using fuzzy concept in order to get the degree of trustworthiness instead of binary classification. We prove with our simulation results that our proposed scheme reduces overhead of the network significantly while without compromising security aspects.

[1]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[2]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[3]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[4]  Marcin Seredynski,et al.  Nature-Inspired Evaluation of Data Classes for Trust Management in MANETs , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[5]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[7]  Pradeep Reddy Ch,et al.  Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs , 2016 .

[8]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[9]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[10]  Hanna Bogucka,et al.  Game theory in wireless networks , 2011 .

[11]  Guy Pujolle,et al.  An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Kamal Kumar Chauhan,et al.  Securing Mobile Ad hoc Networks:Key Management and Routing , 2012, ArXiv.

[13]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[14]  YuHua Yuan,et al.  An Optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) Routing Protocol , 2005, 2005 Asia-Pacific Conference on Communications.

[15]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[16]  K. Cook Trust in Society , 2001 .

[17]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[18]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[19]  Gianpiero Costantino,et al.  Managing Reputation over MANETs , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[20]  Hamamache Kheddouci,et al.  ECGK: An efficient clustering scheme for group key management in MANETs , 2010, Comput. Commun..

[21]  Omar Cheikhrouhou,et al.  Secure Group communication in Wireless Sensor Networks , 2013 .

[22]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[23]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[24]  Niki Pissinou,et al.  Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).

[25]  Omar Cheikhrouhou,et al.  Secure Group Communication in Wireless Sensor Networks: A survey , 2016, J. Netw. Comput. Appl..

[26]  Ruidong Li,et al.  On-demand public-key management for mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[28]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[29]  I. Awan,et al.  Trust Routing in MANET for Securing DSR Routing Protocol , 2010 .

[30]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.