CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2012-10-16

AUTHORS

Wenjia Li, Anupam Joshi, Tim Finin

ABSTRACT

Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead. More... »

PAGES

353-376

References to SciGraph publications

  • 2010-06-22. Security Through Collaboration and Trust in MANETs in MOBILE NETWORKS AND APPLICATIONS
  • 2004-06. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments in WIRELESS PERSONAL COMMUNICATIONS
  • 2002. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks in ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2009. Security through Collaboration in MANETs in COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING
  • 1994-12. Policy driven management for distributed systems in JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10619-012-7113-3

    DOI

    http://dx.doi.org/10.1007/s10619-012-7113-3

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1043336158


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Department of Computer Sciences, Georgia Southern University, 30460, Statesboro, GA, USA", 
              "id": "http://www.grid.ac/institutes/grid.256302.0", 
              "name": [
                "Department of Computer Sciences, Georgia Southern University, 30460, Statesboro, GA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Li", 
            "givenName": "Wenjia", 
            "id": "sg:person.010237100231.43", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010237100231.43"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA", 
              "id": "http://www.grid.ac/institutes/grid.411024.2", 
              "name": [
                "Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Joshi", 
            "givenName": "Anupam", 
            "id": "sg:person.011614435245.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011614435245.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA", 
              "id": "http://www.grid.ac/institutes/grid.411024.2", 
              "name": [
                "Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Finin", 
            "givenName": "Tim", 
            "id": "sg:person.016274302751.69", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016274302751.69"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bf02283186", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000800462", 
              "https://doi.org/10.1007/bf02283186"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03354-4_51", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034930052", 
              "https://doi.org/10.1007/978-3-642-03354-4_51"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11036-010-0243-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012566460", 
              "https://doi.org/10.1007/s11036-010-0243-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1023/b:wire.0000047071.75971.cd", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012913498", 
              "https://doi.org/10.1023/b:wire.0000047071.75971.cd"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-387-35612-9_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030002052", 
              "https://doi.org/10.1007/978-0-387-35612-9_9"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012-10-16", 
        "datePublishedReg": "2012-10-16", 
        "description": "Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node\u00a0may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10619-012-7113-3", 
        "inLanguage": "en", 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1136670", 
            "issn": [
              "0926-8782", 
              "1573-7578"
            ], 
            "name": "Distributed and Parallel Databases", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "31"
          }
        ], 
        "keywords": [
          "Mobile Ad-Hoc Networks", 
          "Context-Aware Security", 
          "Ad-Hoc Networks", 
          "malicious behavior", 
          "trust framework", 
          "pre-deployed infrastructure", 
          "multi-hop communication", 
          "misbehavior detection mechanisms", 
          "faulty behavior", 
          "communication channel status", 
          "malicious nodes", 
          "malicious purposes", 
          "malicious activities", 
          "limited overhead", 
          "data packets", 
          "little research work", 
          "network operation", 
          "channel status", 
          "contextual information", 
          "faulty nodes", 
          "detection mechanism", 
          "radio range", 
          "significant research efforts", 
          "simulation results", 
          "nodes", 
          "misbehavior", 
          "battery status", 
          "security", 
          "research work", 
          "network", 
          "framework", 
          "research efforts", 
          "overhead", 
          "packets", 
          "infrastructure", 
          "communication", 
          "information", 
          "weather conditions", 
          "operation", 
          "work", 
          "efforts", 
          "results", 
          "behavior", 
          "purpose", 
          "cast frameworks", 
          "policy", 
          "lack", 
          "mechanism", 
          "paper", 
          "range", 
          "conditions", 
          "status", 
          "problem", 
          "activity", 
          "investigation", 
          "further investigation", 
          "traditional misbehavior detection mechanisms"
        ], 
        "name": "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies", 
        "pagination": "353-376", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1043336158"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10619-012-7113-3"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10619-012-7113-3", 
          "https://app.dimensions.ai/details/publication/pub.1043336158"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:28", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_571.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10619-012-7113-3"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10619-012-7113-3'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10619-012-7113-3'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10619-012-7113-3'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10619-012-7113-3'


     

    This table displays all metadata directly associated to this object as RDF triples.

    152 TRIPLES      22 PREDICATES      87 URIs      74 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10619-012-7113-3 schema:about anzsrc-for:08
    2 anzsrc-for:0806
    3 schema:author Na3bc0f7844134971ab93d9e60ab68f04
    4 schema:citation sg:pub.10.1007/978-0-387-35612-9_9
    5 sg:pub.10.1007/978-3-642-03354-4_51
    6 sg:pub.10.1007/bf02283186
    7 sg:pub.10.1007/s11036-010-0243-9
    8 sg:pub.10.1023/b:wire.0000047071.75971.cd
    9 schema:datePublished 2012-10-16
    10 schema:datePublishedReg 2012-10-16
    11 schema:description Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.
    12 schema:genre article
    13 schema:inLanguage en
    14 schema:isAccessibleForFree true
    15 schema:isPartOf N42ff3b59279a4535af014fd01f8526e7
    16 N61b8ffa0e4f540beba85b7570af6414d
    17 sg:journal.1136670
    18 schema:keywords Ad-Hoc Networks
    19 Context-Aware Security
    20 Mobile Ad-Hoc Networks
    21 activity
    22 battery status
    23 behavior
    24 cast frameworks
    25 channel status
    26 communication
    27 communication channel status
    28 conditions
    29 contextual information
    30 data packets
    31 detection mechanism
    32 efforts
    33 faulty behavior
    34 faulty nodes
    35 framework
    36 further investigation
    37 information
    38 infrastructure
    39 investigation
    40 lack
    41 limited overhead
    42 little research work
    43 malicious activities
    44 malicious behavior
    45 malicious nodes
    46 malicious purposes
    47 mechanism
    48 misbehavior
    49 misbehavior detection mechanisms
    50 multi-hop communication
    51 network
    52 network operation
    53 nodes
    54 operation
    55 overhead
    56 packets
    57 paper
    58 policy
    59 pre-deployed infrastructure
    60 problem
    61 purpose
    62 radio range
    63 range
    64 research efforts
    65 research work
    66 results
    67 security
    68 significant research efforts
    69 simulation results
    70 status
    71 traditional misbehavior detection mechanisms
    72 trust framework
    73 weather conditions
    74 work
    75 schema:name CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
    76 schema:pagination 353-376
    77 schema:productId N4265ae47cfad47f29a78de593df3e3f5
    78 N83626730cf5948c5a60e1074c13ee27e
    79 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043336158
    80 https://doi.org/10.1007/s10619-012-7113-3
    81 schema:sdDatePublished 2022-01-01T18:28
    82 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    83 schema:sdPublisher N8e5d92dd659e4f9b8c62de297cf77bf8
    84 schema:url https://doi.org/10.1007/s10619-012-7113-3
    85 sgo:license sg:explorer/license/
    86 sgo:sdDataset articles
    87 rdf:type schema:ScholarlyArticle
    88 N13ceaa803fc14c18aadb142500db5a86 rdf:first sg:person.011614435245.41
    89 rdf:rest Na4c31e94fb014a57934850d6f952d5a7
    90 N4265ae47cfad47f29a78de593df3e3f5 schema:name dimensions_id
    91 schema:value pub.1043336158
    92 rdf:type schema:PropertyValue
    93 N42ff3b59279a4535af014fd01f8526e7 schema:issueNumber 2
    94 rdf:type schema:PublicationIssue
    95 N61b8ffa0e4f540beba85b7570af6414d schema:volumeNumber 31
    96 rdf:type schema:PublicationVolume
    97 N83626730cf5948c5a60e1074c13ee27e schema:name doi
    98 schema:value 10.1007/s10619-012-7113-3
    99 rdf:type schema:PropertyValue
    100 N8e5d92dd659e4f9b8c62de297cf77bf8 schema:name Springer Nature - SN SciGraph project
    101 rdf:type schema:Organization
    102 Na3bc0f7844134971ab93d9e60ab68f04 rdf:first sg:person.010237100231.43
    103 rdf:rest N13ceaa803fc14c18aadb142500db5a86
    104 Na4c31e94fb014a57934850d6f952d5a7 rdf:first sg:person.016274302751.69
    105 rdf:rest rdf:nil
    106 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    107 schema:name Information and Computing Sciences
    108 rdf:type schema:DefinedTerm
    109 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    110 schema:name Information Systems
    111 rdf:type schema:DefinedTerm
    112 sg:journal.1136670 schema:issn 0926-8782
    113 1573-7578
    114 schema:name Distributed and Parallel Databases
    115 schema:publisher Springer Nature
    116 rdf:type schema:Periodical
    117 sg:person.010237100231.43 schema:affiliation grid-institutes:grid.256302.0
    118 schema:familyName Li
    119 schema:givenName Wenjia
    120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010237100231.43
    121 rdf:type schema:Person
    122 sg:person.011614435245.41 schema:affiliation grid-institutes:grid.411024.2
    123 schema:familyName Joshi
    124 schema:givenName Anupam
    125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011614435245.41
    126 rdf:type schema:Person
    127 sg:person.016274302751.69 schema:affiliation grid-institutes:grid.411024.2
    128 schema:familyName Finin
    129 schema:givenName Tim
    130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016274302751.69
    131 rdf:type schema:Person
    132 sg:pub.10.1007/978-0-387-35612-9_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030002052
    133 https://doi.org/10.1007/978-0-387-35612-9_9
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/978-3-642-03354-4_51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034930052
    136 https://doi.org/10.1007/978-3-642-03354-4_51
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/bf02283186 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000800462
    139 https://doi.org/10.1007/bf02283186
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/s11036-010-0243-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012566460
    142 https://doi.org/10.1007/s11036-010-0243-9
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1023/b:wire.0000047071.75971.cd schema:sameAs https://app.dimensions.ai/details/publication/pub.1012913498
    145 https://doi.org/10.1023/b:wire.0000047071.75971.cd
    146 rdf:type schema:CreativeWork
    147 grid-institutes:grid.256302.0 schema:alternateName Department of Computer Sciences, Georgia Southern University, 30460, Statesboro, GA, USA
    148 schema:name Department of Computer Sciences, Georgia Southern University, 30460, Statesboro, GA, USA
    149 rdf:type schema:Organization
    150 grid-institutes:grid.411024.2 schema:alternateName Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA
    151 schema:name Department of CSEE, University of Maryland, Baltimore County, 21250, Baltimore, MD, USA
    152 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...