Skip to main content

A Formal Environment for MANET Organization and Security

  • Conference paper
  • First Online:
Cryptology and Network Security (CANS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9476))

Included in the following conference series:

Abstract

A Mobile Ad-hoc Network (MANET) allows the communication of autonomous nodes without any preexistent network infrastructure. This main characteristic may introduce several vulnerabilities which can be exploited by malicious nodes. Thus, one of the basic requirements for the well behavior of such network is to detect and isolate such nodes. Recently, we proposed a reputation based trust management scheme detecting and isolating malicious nodes. This scheme was built upon a specific clustering algorithm baptized MCA (Mobility-based Clustering Approach) and based on two phases: the setting up and the maintenance. In the setting up phase, stable clusters are generated with one-hop members and elected cluster-heads (CHs). In the maintenance phase, the organization of the clusters is maintained in presence of mobility using adequate algorithms. The whole proposition was called TMCA (Trust based MCA) and was also extended with a delegation process resulting a proposition baptized DTMCA (Delegation process TMCA). Once DTMCA is defined, we have found important to validate formally each one of its components in order to avoid any conflict, lack or misbehaving situations. This process requires in a first step a formal specification. This is our main concern in this paper where we propose in a first part a formal specification using inference systems based on logical rules. Two inference systems are proposed. The first one handles the MCA maintenance phase and the second one specifies the TMCA scheme on which the delegation process is integrated. A formal validation using these inference systems is proposed in a second step in order to prove the soundness and the completeness of the various propositions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma, S.K., Kumar, R., Gangwar, A., Pakhre, K.: Routing protocols and security issues in MANET: a survey. Int. J. Emerg. Technol. Adv. Eng. (IJETAE) 4(4), April 2014

    Google Scholar 

  2. Lindsay, P.A.: “Specification and validation of a network security policy model”, Technical report. 97–05, Software Verification Research Centre, the University of Queensland, April 1997

    Google Scholar 

  3. IEEE Guide to Software Requirements Specification. ANSI / IEEE Std 830 (1998)

    Google Scholar 

  4. Abassi, R., Guemara El Fatmi, S.: A novel validation method for firewall security policy. J. Inf. Assur. Secur. 4, 329–337 (2009)

    Google Scholar 

  5. Kumar, B.P., Sekhar, P.C., Papanna, N., Bhushan, B.B.: A survey on MANET security challenges and routing protocol. Int. J. Comput. Technol. Appl. (IJCTA) 4, 248–256 (2013)

    Google Scholar 

  6. Nassuora, A.B., Hussein, A.R.H.: CBPMD: a new weighted distributed clustering algorithm for mobile Ad hoc networks (MANETs). Am. J. Sci. Res. 22, 43–56 (2011). ISSN, 1450–223X

    Google Scholar 

  7. Youssef, N.B., Bouhoula, A., Jasquemard, F.: Automatic verification of conformance of firewall configurations to security policies. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2009, Sousse, Tunisia (2009)

    Google Scholar 

  8. El Hassani, A.A., El Kalam, A.A., Bouhoula, A., Abassi, R., Ouahman, A.A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryma Abassi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Douss, A.B.C., Abassi, R., Youssef, N.B., Fatmi, S.G.E. (2015). A Formal Environment for MANET Organization and Security. In: Reiter, M., Naccache, D. (eds) Cryptology and Network Security. CANS 2015. Lecture Notes in Computer Science(), vol 9476. Springer, Cham. https://doi.org/10.1007/978-3-319-26823-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26823-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26822-4

  • Online ISBN: 978-3-319-26823-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics