Trust level evaluation for communication paths in MANETs by using attribute certificates

Shinichiro Inoue, Masakuni Ishii, Naofumi Sugaya, Takeshi Yatagai, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Since a Mobile Ad hoc NETwork(MANET) is a distributed and self-organized network, there could be malicious nodes that intentionally falsify or drop packets. Recently, a number of trust-based secure routing protocols have been proposed for evading those malicious nodes in communication paths. However, two problems still remain. One problem is that trust itself might be falsified and a node might spoof its ID. The other is that most of calculated trusts are not used and expired. In this paper, we propose a scheme to evaluate trust level of communication paths in MANETs using Attribute Certificates (ACs). Using ACs can detect if trust has been falsified, and if a node has spoofed its ID. Moreover, our proposed scheme is able to not only increase security level, but also reduce the number of trust which expire without being used. Simulation results show better packet delivery rate in a path selected by proposed scheme, and improvement of usage rate for calculated trust.

Original languageEnglish
Title of host publicationICCE 2010 - 3rd International Conference on Communications and Electronics
Pages70-75
Number of pages6
DOIs
Publication statusPublished - 2010
Event3rd International Conference on Communications and Electronics, ICCE 2010 - Nha Trang, Viet Nam
Duration: 2010 Aug 112010 Aug 13

Publication series

NameICCE 2010 - 3rd International Conference on Communications and Electronics

Other

Other3rd International Conference on Communications and Electronics, ICCE 2010
Country/TerritoryViet Nam
CityNha Trang
Period10/8/1110/8/13

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Trust level evaluation for communication paths in MANETs by using attribute certificates'. Together they form a unique fingerprint.

Cite this