Mobile Ad Hoc Networks are wireless networks, of which the installation does not require any existing infrastructure, this property has induced the philosophy of “all distributed” and distributed control. The departure and arrival of a node is autonomous and does not interfere with the continuity of services. These advantages allow the deployability of these networks in situations where the use of wired networks is expensive, difficult or even impossible. However, with these advantages, some security concerns are emerging. Indeed, with a shared communication medium and in the absence of a central entity or a fixed infrastructure, traditional security solutions are not adapted, it is now difficult to manage encryption keys, certificate distribution, and trust management between nodes. As a node does not necessarily have knowledge about others when the network is growing, trust a priori may not exist. We are interested in this paper to study security problems in Manets in general, and more particularly those related to trust management. This paper detail, the principle, the constraints, and the challenges of deploying suitable trust models, to deal with Manets constraints. An example of a light trust model for enforcing security in OLSR routing protocol used for Manets, is presented and evaluated.
[1]
Giannis F. Marias,et al.
Cooperation enforcement schemes for MANETs: a survey
,
2006,
Wirel. Commun. Mob. Comput..
[2]
Pooja Pilankar.
TRUST BASED SECURITY IN MANET
,
2016
.
[3]
Ahmet Rizaner,et al.
A novel support vector machine based intrusion detection system for mobile ad hoc networks
,
2017,
Wireless Networks.
[4]
Mohammad Ashiqur Rahman,et al.
Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study
,
2016,
2016 8th International Conference on Communication Systems and Networks (COMSNETS).
[5]
Rachid Latif,et al.
A novel security approach for struggling black hole attack in optimised link state routing protocol
,
2015,
Int. J. Sens. Networks.
[6]
Yacine Challal,et al.
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
,
2012,
J. Netw. Comput. Appl..
[7]
Rutvij H. Jhaveri,et al.
DoS Attacks in Mobile Ad Hoc Networks: A Survey
,
2012,
2012 Second International Conference on Advanced Computing & Communication Technologies.