Loading...

Probabilistic key pre-distribution for heterogeneous mobile ad hoc networks using subjective logic

Ahmadi, M ; Sharif University of Technology | 2015

454 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/AINA.2015.184
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2015
  4. Abstract:
  5. Public key management scheme in mobile ad hoc networks (MANETs) is an inevitable solution to achieve different security services such as integrity, confidentiality, authentication and non reputation. Probabilistic asymmetric key pre-distribution (PAKP) is a self-organized and fully distributed approach. It resolves most of MANET's challenging concerns such as storage constraint, limited physical security and dynamic topology. In such a model, secure path between two nodes is composed of one or more random successive direct secure links where intermediate nodes can read, drop or modify packets. This way, intelligent selection of intermediate nodes on a secure path is vital to ensure security and lower traffic volume. In this paper, subjective logic is used to improve PAKP method with the aim to select the most trusted and robust path. Consequently, our approach results in a better data traffic and also improve the security. Proposed algorithm chooses the least number of nodes among the most trustworthy nodes which are able to act as intermediate stations. We exploit two subjective logic based models: one exploits the subjective nature of trust between nodes and the other considers path conditions. We then evaluate our approach using network simulator ns-3. Simulation results confirm the effectiveness and superiority of the proposed protocol compared to the basic PAKP scheme
  6. Keywords:
  7. Probabilistic asymmetric key pre-distribution ; Subjective logic ; Trust ; Digital storage ; Mobile security ; Network security ; Probability distributions ; Public key cryptography ; Telecommunication networks ; Asymmetric key ; Distributed approaches ; MANET ; Mobile adhoc network (MANETs) ; Network simulator ns-3 ; Public key management ; Subjective Logic ; Mobile ad hoc networks
  8. Source: Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 25 March 2015 through 27 March 2015 ; Volume 2015-April , March , 2015 , Pages 185-192 ; 1550445X (ISSN) ; 9781479979042 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/7097969/?reload=true