GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Proceedings of the 9th annual international conference on Mobile computing and networking
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
Secure Routing and Intrusion Detection in Ad Hoc Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
The pothole patrol: using a mobile sensor network for road surface monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Policy-Based Malicious Peer Detection in Ad Hoc Networks
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine
MDM '11 Proceedings of the 2011 IEEE 12th International Conference on Mobile Data Management - Volume 01
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
Hi-index | 0.00 |
Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. Significant research efforts have been made to address the problem of detecting misbehaviors. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and study a Context-Aware Security and Trust framework (CAST) for MANETs, in which various contextual information, such as communication channel status, battery status, and weather condition, are collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the CAST framework is able to accurately distinguish malicious nodes from faulty nodes with a limited overhead.