×

Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks. (English) Zbl 1365.90060

Summary: The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network. Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographic clustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.

MSC:

90B18 Communication networks in operations research
68M10 Network design and communication in computer systems
90B10 Deterministic network models in operations research

References:

[1] Ko Y B and Vaidya N H 1999 Geocasting in mobile ad hoc networks: Location-based multicast algorithms. In: Proceedings of IEEE WMCSA, pp. 101-110
[2] Bellur B 2008 Certificate assignment strategies for a pki-based security architecture in a vehicular network. Proceedings IEEE GLOBECOM, pp 1-6
[3] Chang R S and Wang S H 2008 Hexagonal collaboration groups in sensor networks. Proc. IEEE CCNC pp 358-359
[4] Zhuang Y, Gulliver T A and Coady Y 2013 On planar tessellations and interference estimation in wireless ad-hoc networks. IEEE Wireless Commun. Lett. 2(3): 331-334
[5] Fan Y, Yulan Z and Ping X 2015 An overview of ad hoc network security. communications in computer and information science, Springer, vol. 557, pp 129-137
[6] Cao M and Hadjicostis C N 2003 Distributed algorithms for Voronoi diagrams and applications in ad-hoc networks. Technical Report UILUENG-03-2222
[7] Chau M, Cheng R, B Kao B and Ng J 2006 Uncertain data mining: An example in clustering location data. In: Proceedings of PAKDD, pp 199-204
[8] Cheng R, Xie X, Yiu M L, Chen J and Sun L 2010 Uv-diagram: A Voronoi diagram for uncertain data. In: Proceedings of 26th IEEE International Conference on Data Engineering, pp 796-807
[9] Kao B, Lee S D, Lee F, Cheung D and Ho W S 2010 Clustering uncertain data using Voronoi diagrams and R-tree index. IEEE Trans. Knowledge and Data Eng. 22(9): 1219-1233
[10] Mohamed Aissa and Abdelfettah Belghith 2014 A node quality based clustering algorithm in wireless mobile ad hoc networks. In: Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies, Elsevier, vol. 32, pp. 174-181
[11] Abdelhak B, Abdelhak B and Saad H 2013 Survey of clustering schemes in mobile ad hoc networks, Commun. Netw. pp 8-14
[12] Khalid H, Abdul H Abdullah, Khalid M Awan, Faraz Ahsan, Akhtab Hussain and Johor Bahru 2013 Cluster head election schemes for WSN and MANET: A survey. World Appl. Sci. J. 23(5): 611-620
[13] Mohd Junedul Haque, Mohd Muntjir and Hussain A S 2015 A comparative survey for computation of cluster-head in MANET. Int. J. Comput. Appl. 118 (3): 6-9
[14] Fan P, Li G, Kai Cai and Letaief K B 2007 On the geometrical characteristic of wireless ad-hoc networks and its application in network performance analysis. IEEE Trans. Wireless Commun. 6(4): 1256-1265
[15] Stojmenovic I, Ruhil A P and Lobiyal D K 2006 Voronoi diagram and convex hull based geocasting and routing in wireless networks. Wireless Commun. Mobile Comput. 6: 247-258
[16] Ngai W K, Kao B, Chui C K, Cheng R, Chau M and Yip K Y 2006 Efficient clustering of uncertain data. Proceedings of ICDM pp. 436-445
[17] Renu D, Manju Khari and Yudhvir Singh 2012 Survey of trust schemes on ad-hoc network. Int. J. AdHoc Netw. Syst. springer, 2 pp. 170-180
[18] Manju Khari and Yudhvir Singh 2012 Different ways to achieve trust in MANET. Int. J. AdHoc Netw. Syst. 2(2): 1-10
[19] Jingwei H and David N 2009 A calculus of trust and its application to pki and identity management. In: Proceedings of 8th Symposium on Identity and Trust on the Internet, pp. 23-37
[20] Liu K, Abu-Ghazaleh N and Kang K 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distributed Comput. 67: 215-228 · Zbl 1158.68330
[21] Ferdous R, Muthukkumarasamy V and Sithirasenan E 2011 Trust-based cluster head selection algorithm for mobile ad hoc networks. In: Proceedings of International Joint Conference IEEE TrustCom pp. 589-596
[22] Cho J H, Chan K S, Chen I R 2013 Composite trust-based public key management in mobile ad hoc networks. ACM 28th Symposium on Applied Computing, Coimbra, Portugal, pp 1949-1956
[23] Wei Z, Tang H, Richard Yu, Wang M and Mason P 2014 Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Vehicular Technol. 63(9): 4647-4658
[24] Ing-Ray Chen, Jia Guo, Fenye Bao and Jin-Hee Cho 2014 Trust management in mobile ad hoc networks for bias minimization and application performance maximization ad hoc networks. Ad hoc networks. Elsevier, vol. 19, pp. 59-74
[25] Deering S, Estrin D, Farinacci D, Jacobson V, Helmy A and Wei L 1997 Protocol independent MulticastVersion 2, dense mode specification. Internet Draft, ftp://ietf.org/internet-drafts/draft-ietf-idmr-pim-dm-spec-05.txt
[26] Mohammad M Qabajeh, Aisha H Abdalla, Othman O Khalifa and Liana K Qabajeh2015 A survey on scalable multicasting in mobile ad hoc networks. Wireless Personal Commun. 80(1): 369-393
[27] Kanchan D and Asutkar G M 2016 Enhancement in the performance of routing protocols for wireless communication using clustering, encryption, and cryptography. Artificial intelligence and evolutionary computations in engineering systems, advances in intelligent systems and computing, vol. 394, pp 547-558.
[28] Jormakka J and Jormakka H 2014 Revocation of user certificates in a military ad hoc network. Brazilian J. Inform. Security Cryptogr. 1(1): 1-3
[29] Yki K and Mikko S 2014 Survey of certificate usage in distributed access control. Computers & security, Elsevier vol 44, pp 16-32
[30] Wei Liu, Hiroki Nishiyama, Nirwan Ansari and Nei Kato 2011 A study on certificate revocation in mobile ad hoc networks. IEEE International Conference on Communications (ICC), pp 1-5
[31] Mohammad Masdari and Javad P B 2012 Distributed certificate management in mobile ad hoc networks. Int. J. Appl. Inform. Syst. 4(6): 33-40
[32] Mohamed M E A Mahmoud, Jelena Misic, Kemal Akkaya and Xuemin Shen 2015 Investigating public-key certificate revocation in smart grid. IEEE Internet Things J. 2: 490-503
[33] Mohammad Masdari, Sam J and Jamshid B 2015a Improving OCSP-based certificate validations in wireless ad hoc networks. Wireless Personal Commun., 82 (1): 377-400
[34] Mohammad Masdari, Sam J, Jamshid B and Ahmad Khadem-Zadeh 2015b Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks. Computers & security, Elsevier, vol 49, pp. 17-27
[35] Liu W, Nishiyama H, Ansari N, Yang J and Kato N 2013 Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distributed Syst. 24(2): 239-249
[36] Luo H, Kong J, Zerfos P, Lu S and Zhang L 2004 URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12(6): 1049-1063
[37] Taisuke Izumi, Tomoko Izumi, Hirotaka Ono and Koichi Wada 2015 Approximability of minimum certificate dispersal with tree structures. Theoretical computer science, Elsevier, vol. 591, pp 5-14 · Zbl 1322.68143
[38] Park K, Nishiyama H, Ansari N and Kato N 2010 Certificate revocation to cope with false accusations in mobile ad hoc networks. Proceedings of IEEE 71st Vehicular Technology Conference pp 1-5
[39] Raya M, Manshaei M H, Felegyhazi M and Hubaux J P 2008 Revocation games in ephemeral networks. Proceedings of ACM CCS
[40] Mawloud Omar, Hamida B, Lydia Mammeri, Amel Taalba and Abdelkamel T 2016 Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J. Netw. Comput. Appl., Elsevier, 62: 153-162
[41] Bettstetter C and Wagner C 2002 The spatial node distribution of the random waypoint mobility model. Proceedings German Workshop on Mobile Ad Hoc Networks (WMAN)
[42] Bai F and Helmy A 2004 A survey of mobility modeling and analysis in wireless ad hoc networks. Wireless ad hoc and sensor networks. Kluwer academic publishers
[43] Aschenbruck N, ErnstR, Gerhards-Padilla E and Schwamborn M 2010 BonnMotion - A mobility scenario generation and analysis tool. In: Proceedings of the 3rd International Conference on Simulation Tools andTechniques
[44] Wasef A and Shen X 2009 EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Tech. 58(9): 5214-5224
[45] Krikke 2005 T-engine: Japan’s ubiquitous computing architecture is ready for prime time. IEEE Pervasive Comput. 4(2): 4-9
[46] Noboru K and Ken S 2010 Ubiquitous ID: Standards for ubiquitous computing and the internet of things. IEEE Pervasive Comput. 9(4): 98-101
[47] Khan M F F and Sakamura K 2015 Tamper-resistant security for cyber-physical systems with eTRON architecture. IEEE International Conference on Data Science and Data Intensive Systems, Sydney, NSW, pp 196-203
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.