A Mobile Ad hoc Network is a network of mobile nodes operating in an infrastructure-less network. These nodes not have the defense rendered by firewalls in infrastructure-based networks. Trust oriented system aids to improvise this situation. So, the incorporation of trust in routing decisions yields a more secure and reliable framework for such type of networks. As if any suggested model does not achieve as projected, it is reduced quality of service. The validation before deployment of any model leads to a more stable model. A good way to confirm a model is to use formal specification and verification techniques. In the present study, with the aim to include trust component in conventional OLSR protocol of ad hoc network and also to rule out invalid actions, formal specifications of the various procedures of trusted OLSR Protocol are given using -Z‖ specification language. Z is a state-oriented formal specification language based on set theory and predicate logic. Z/EVES, a proof tool based on EVES and ZF set theory that supports the Z notation is used for the formal specifications. 1. REVIEW OF LITERATUREThere are numerous routing protocols for ad hoc networks are in literature, and every protocol has some worth on one aspect or the other. With the aim of to decide on a routing protocol for building a trust oriented framework for ad hoc networks, a study comprising the performance analysis of routing protocols [13] namely -DSR, AODV, OLSR and GRP has been done for common applications: email and ftp in a simulated environment. The observation is that, the OLSR protocol has the better response over others.
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The circumstances where it is likely unrealistic or infeasible to deploy infrastructure, in these cases mobile devices could set up a possibly short lived network for the communication needs of the moment by a quick deployment. Security is a vital issue in an ad hoc network owing to its intrinsic vulnerabilities. These vulnerabilities are nature of its structure that cannot be eliminated. Consequently, attacks with malicious objectives have been and will be devised to exploit these vulnerabilities and to perturb its operations. This paper presents an inclusive study of the ad hoc network in terms of its characteristics, vulnerabilities, challenges, routing, authentication and attacks specific to these types of networks.
Conventionally, user authentication and access control mechanisms would be almost enough, to handle security for stand-alone computers and small networks. Ad hoc networks are illustrated by multi-hop wireless connectivity and recurrently changing network topology which have made them infrastructure less. Adding trust to the existing security infrastructures would improvise the security of these environments. Describing trust relations and their sub-components using ontologies, creates a methodology and mechanism in order to efficiently design and engineer trust networks. This is going to be used as a service for providing trust for ad hoc network at any level i.e. routing, authentication or access control. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a possible implementation of suggested framework are performed to make out the characteristics of the trust model and its effect on the ad hoc network operations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.