Academic literature on the topic 'Trust enhanced security architecture for the MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust enhanced security architecture for the MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trust enhanced security architecture for the MANET"

1

Yamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (October 31, 2022): 757–65. http://dx.doi.org/10.18280/isi.270508.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path. Because of its openness and complexity, MANET can be attacked in a number of ways. To begin mitigating potential security risks, a number of different cryptographic key generation strategies are explored. A key management system for MANET security is available with different encryption techniques. Identity with Trust Level based Cryptography Model (ITLCM) is used to generate multiple keys and distribute these to particular targets. At this stage, key management protocols are essential to any secure group architecture of communication. Because of its dynamic topology which extensively affects its application, the multi key management is an essential task. When compared to more conventional methods of protecting a network, MANET security is entirely novel. Security routing protocol implementation is difficult since it requires the production and distribution of multiple keys. To provide both connection and message protection without relying on third parties, the Neighbor Trust Weight based Routing Model (NTWRM) is designed. In the proposed model, a trusted node is selected to monitor all of the nodes in the routing process to create a stable multi-key distribution environment that enhances MANET performance. In comparison with traditional methods, the proposed model shows that its findings are better than the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
2

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Ching, and Vijay Varadharajan. "MobileTrust: a trust enhanced security architecture for mobile agent systems." International Journal of Information Security 9, no. 3 (December 11, 2009): 153–78. http://dx.doi.org/10.1007/s10207-009-0098-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, R. Sathish, A. Akthar unissa, S. Koperundevi, and S. Suganthi. "Enhanced Trust Based Architecture in MANET using AODV Protocol to Eliminate Packet Dropping Attacks." International Journal of Engineering Trends and Technology 34, no. 1 (April 25, 2016): 21–27. http://dx.doi.org/10.14445/22315381/ijett-v34p204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Musthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.

Full text
Abstract:
In this work we present novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the cluster heads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network. We also proposing a special security routing architecture called Local Intrusion Detection (LID) to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased.
APA, Harvard, Vancouver, ISO, and other styles
6

Begum, Shifana, Megha M. Gamskar, and Prakrithi Mogasale. "Security of Data with Enhanced Technique of AASR Protocol for Secure Crosslayer Routing in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (May 30, 2020): 17–21. http://dx.doi.org/10.46501/ijmtst060605.

Full text
Abstract:
MANET supports communication without any wired medium and with layered architecture. It does not uses any infrastructure support. Present alternative to the layered architecture is cross layer design approaches and the interaction between the layers is supported. The security of CLPC (Cross Layer Design Approach for Power control) routing protocol will be discussed in this paper. The transmission power and finding the effective route between source and destination can be improved by CLPC. The reliable path between the source and destination can be determined by RSS from the physical layer, but it is vulnerable to the DOS attacks. Here we propose a Secure cross layer power control protocol SCLPC to placate the attacks on CLPC. The SCLPC protocol provides better results and performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.

Full text
Abstract:
In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.
APA, Harvard, Vancouver, ISO, and other styles
8

Nagarajan, Aarthi, and Vijay Varadharajan. "Dynamic trust enhanced security model for trusted platform based services." Future Generation Computer Systems 27, no. 5 (May 2011): 564–73. http://dx.doi.org/10.1016/j.future.2010.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Devi, Vallala Sowmya, and Nagaratna P. Hegde. "Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer." Wireless Personal Communications 100, no. 3 (February 8, 2018): 923–40. http://dx.doi.org/10.1007/s11277-018-5358-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mao, Ming, Peng Yi, Tao Hu, Zhen Zhang, Xiangyu Lu, and Jingwei Lei. "Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs." Mobile Information Systems 2021 (August 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/7611619.

Full text
Abstract:
One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination and enhanced user security in the Internet of Vehicles. However, due to a large number of vehicles, the limited computing power of individuals, and the highly dynamic nature of the network, a universal and flexible architecture is required to realize the trust of vehicles in a dynamic environment. The existing solutions for trust management cannot be directly applied to the Internet of Vehicles. To ensure the safe transmission of data between vehicles and overcome the problems of high communication delay and low recognition rate of malicious nodes in the current trust management scheme, an efficient flow forwarding mechanism of the RSU close to the controller in the Software-Defined Vehicular Network is used to establish a hierarchical hybrid trust management architecture. This method evaluates the dynamic trust change of vehicle behavior based on the trust between vehicles and the auxiliary trust management of the infrastructure to the vehicle, combined with static and dynamic information and other indicators. The proposed trust management scheme is superior to the comparative schemes in resisting simple attacks, selective misbehavior attacks, and time-dependent attacks under the condition of ensuring superior real-time performance. Its overall accuracy is higher than that of the baseline scheme.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Trust enhanced security architecture for the MANET"

1

Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trust enhanced security architecture for the MANET"

1

Garg, Roopali. "MANET." In Advances in Wireless Technologies and Telecommunication, 444–76. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch014.

Full text
Abstract:
MANETs (Mobile Ad-Hoc Networks) are an infrastructure-less network where attackers can easily attack on the network from any side. Amongst innumerable attacks is ‘Sybil attack' that causes severe hazard to the network. It is an attack which uses one/many identities at a time. The identities used by Sybil attackers are either created by it or uses someone else's identity. This attack can decrease the trust of any legitimate node by using identity of that node and accumulate the secret or important data. Sybil attackers distribute secret data in other networks and it reduces the secrecy of network. This research work implements Enhanced lightweight Sybil attack detection technique that is used to detect Sybil attack in MATLAB. The concern is to improve the security of the network by removing the Sybil nodes from the network. The work has been carried out using four parameters namely - Speed, Energy, frequency and latency. During the research work, experiments were carried out to observe the trend of SNR with BER; Throughput with SNR and Throughput with BER.
APA, Harvard, Vancouver, ISO, and other styles
2

Ciszkowski, Tomasz, and Zbigniew Kotulski. "Secure Routing with Reputation in MANET." In Handbook of Research on Wireless Security, 449–60. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch028.

Full text
Abstract:
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make it vulnerable to security threats. Support for anonymity in MANET is orthogonal to a critical security challenge we faced in this chapter. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resistance to known attacks. The distributed reputation system is incorporated for a trust management and malicious behaviour detection in the network.
APA, Harvard, Vancouver, ISO, and other styles
3

Sarbhukan, Vaishali Vilas, and Lata Ragha. "Mobile Ad Hoc Networks Security Enhancement With Trust Management." In Managing Resources for Futuristic Wireless Networks, 1–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-5225-9493-2.ch001.

Full text
Abstract:
The mobility and scalability brought by wireless networks made it possible in many applications. In MANET, discovering the stable, secure, and reliable routes is a challenging research problem due to the open nature of wireless communications. In Zhexiong Wei Routing Trust scheme (ZWRT), Bayesian approach and Dempster Shafer theory is used to evaluate more realistic trust value. Mohamed et al proposed Establishing STAble and Reliable Routes (ESTAR) system in heterogeneous multihop wireless networks. The above existing methods failed to solve the complete problem of information loss in MANETs. There are several other reasons due to which the information may loss in MANETS, such as mobility and congestion of mobile nodes. Therefore, the novel Enhanced Trust-based Secure Routing (ETSR) scheme is presented to deliver stable, reliable, and secure data communication in MANETs. The simulation results demonstrate that ETSR routing protocol improve QoS performance as compared to state-of-the-art techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Allison, David S., Hany F. EL Yamany, and Miriam A. M. Capretz. "A Privacy Service for Comparison of Privacy and Trust Policies within SOA." In Threats, Countermeasures, and Advances in Applied Information Security, 248–65. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch013.

Full text
Abstract:
Privacy for Service-Oriented Architecture (SOA) is required to gain the trust of those who would use the technology. Through the use of an independent Privacy Service (PS), the privacy policies of a service consumer and provider can be compared to create an agreed upon privacy contract. In this chapter, the authors further define a metamodel for privacy policy creation and comparison. A trust element is developed as an additional criterion for a privacy policy. The authors define the PS, outline what operations it must perform to accomplish its goals, and present how the PS operates in different scenarios. They believe the PS, combined with the enhanced metamodel, provides a strong solution for providing privacy in an SOA environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Liampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Cyber Law, Privacy, and Security, 157–87. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch009.

Full text
Abstract:
The more information users disclose to pervasive systems or social media, the better quality and enhanced experience they enjoy for a wider variety of personalised services. However, the privacy concerns of individuals that use such systems have dramatically risen the last years, especially after several events of massive security breaches in various computing or communication systems that have reached the news. This chapter presents the approach being employed by the SOCIETIES project to protect the privacy of sensitive user data and ensure the trustworthiness of delivered services via social and pervasive computing systems. This framework has already been designed, implemented and evaluated via real user trials engaging wide and heterogeneous user populations. In addition to the respective requirements, architecture and features discussed herewith, this chapter elaborates on the user trial that has been conducted in university settings to validate this system focusing on the privacy and trust evaluation results obtained.
APA, Harvard, Vancouver, ISO, and other styles
6

Mitrakas, Andreas. "Certificate Management Interoperability for E-Government Applications." In Secure E-Government Web Services, 143–61. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-138-4.ch009.

Full text
Abstract:
Secure eGovernment aims at supporting public administration in delivering enhanced public services. In eGovernment electronic signatures and certification services are used to invoke trust and security in services and applications. Certification services, however, are often on offer in an apparent geographical or contextual isolation threatening to create new fault lines across eGovernment services that rely on them. As public administration often operates at multiple levels and in a compartmental manner, the risk is that limitations in the interoperability of certification services might hamper trust and security in the whole value chain of eGovernment. Drawing from the case of small public administrations this paper proposes a certification service architecture and approach to support interoperability in secure eGovernment services.
APA, Harvard, Vancouver, ISO, and other styles
7

Liampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Censorship, Surveillance, and Privacy, 536–66. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7113-1.ch029.

Full text
Abstract:
The more information users disclose to pervasive systems or social media, the better quality and enhanced experience they enjoy for a wider variety of personalised services. However, the privacy concerns of individuals that use such systems have dramatically risen the last years, especially after several events of massive security breaches in various computing or communication systems that have reached the news. This chapter presents the approach being employed by the SOCIETIES project to protect the privacy of sensitive user data and ensure the trustworthiness of delivered services via social and pervasive computing systems. This framework has already been designed, implemented and evaluated via real user trials engaging wide and heterogeneous user populations. In addition to the respective requirements, architecture and features discussed herewith, this chapter elaborates on the user trial that has been conducted in university settings to validate this system focusing on the privacy and trust evaluation results obtained.
APA, Harvard, Vancouver, ISO, and other styles
8

Liampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Advances in Wireless Technologies and Telecommunication, 410–39. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8732-5.ch016.

Full text
Abstract:
The more information users disclose to pervasive systems or social media, the better quality and enhanced experience they enjoy for a wider variety of personalised services. However, the privacy concerns of individuals that use such systems have dramatically risen the last years, especially after several events of massive security breaches in various computing or communication systems that have reached the news. This chapter presents the approach being employed by the SOCIETIES project to protect the privacy of sensitive user data and ensure the trustworthiness of delivered services via social and pervasive computing systems. This framework has already been designed, implemented and evaluated via real user trials engaging wide and heterogeneous user populations. In addition to the respective requirements, architecture and features discussed herewith, this chapter elaborates on the user trial that has been conducted in university settings to validate this system focusing on the privacy and trust evaluation results obtained.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trust enhanced security architecture for the MANET"

1

Tupakula, Udaya, and Vijay Varadharajan. "Trust Enhanced Security Architecture for Detecting Insider Threats." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balakrishnan, Venkat, Vijay Varadharajan, Uday Tupakula, and Phillip Lucs. "TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks." In 2007 15th IEEE International Conference on Networks. IEEE, 2007. http://dx.doi.org/10.1109/icon.2007.4444083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McGibney, Jimmy, and Dmitri Botvich. "A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam." In The Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Iordache, Catalin Adrian, Adrian Viorel Dragomir, and Constantin Viorel Marian. "Public Institutions Updated Enhanced Biometric Security, Zero Trust Architecture and Multi-Factor Authentification." In 2022 International Symposium on Electronics and Telecommunications (ISETC). IEEE, 2022. http://dx.doi.org/10.1109/isetc56213.2022.10010127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krishna, Aarthi, Vijay Varadharajan, and Nathan Tarr. "On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography