Abstract
A Mobile Ad-hoc Network (MANET) allows the communication of autonomous nodes without any preexistent network infrastructure. This main characteristic may introduce several vulnerabilities which can be exploited by malicious nodes. Thus, one of the basic requirements for the well behavior of such network is to detect and isolate such nodes. Recently, we proposed a reputation based trust management scheme detecting and isolating malicious nodes. This scheme was built upon a specific clustering algorithm baptized MCA (Mobility-based Clustering Approach) and based on two phases: the setting up and the maintenance. In the setting up phase, stable clusters are generated with one-hop members and elected cluster-heads (CHs). In the maintenance phase, the organization of the clusters is maintained in presence of mobility using adequate algorithms. The whole proposition was called TMCA (Trust based MCA) and was also extended with a delegation process resulting a proposition baptized DTMCA (Delegation process TMCA). Once DTMCA is defined, we have found important to validate formally each one of its components in order to avoid any conflict, lack or misbehaving situations. This process requires in a first step a formal specification. This is our main concern in this paper where we propose in a first part a formal specification using inference systems based on logical rules. Two inference systems are proposed. The first one handles the MCA maintenance phase and the second one specifies the TMCA scheme on which the delegation process is integrated. A formal validation using these inference systems is proposed in a second step in order to prove the soundness and the completeness of the various propositions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharma, S.K., Kumar, R., Gangwar, A., Pakhre, K.: Routing protocols and security issues in MANET: a survey. Int. J. Emerg. Technol. Adv. Eng. (IJETAE) 4(4), April 2014
Lindsay, P.A.: “Specification and validation of a network security policy model”, Technical report. 97–05, Software Verification Research Centre, the University of Queensland, April 1997
IEEE Guide to Software Requirements Specification. ANSI / IEEE Std 830 (1998)
Abassi, R., Guemara El Fatmi, S.: A novel validation method for firewall security policy. J. Inf. Assur. Secur. 4, 329–337 (2009)
Kumar, B.P., Sekhar, P.C., Papanna, N., Bhushan, B.B.: A survey on MANET security challenges and routing protocol. Int. J. Comput. Technol. Appl. (IJCTA) 4, 248–256 (2013)
Nassuora, A.B., Hussein, A.R.H.: CBPMD: a new weighted distributed clustering algorithm for mobile Ad hoc networks (MANETs). Am. J. Sci. Res. 22, 43–56 (2011). ISSN, 1450–223X
Youssef, N.B., Bouhoula, A., Jasquemard, F.: Automatic verification of conformance of firewall configurations to security policies. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2009, Sousse, Tunisia (2009)
El Hassani, A.A., El Kalam, A.A., Bouhoula, A., Abassi, R., Ouahman, A.A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Douss, A.B.C., Abassi, R., Youssef, N.B., Fatmi, S.G.E. (2015). A Formal Environment for MANET Organization and Security. In: Reiter, M., Naccache, D. (eds) Cryptology and Network Security. CANS 2015. Lecture Notes in Computer Science(), vol 9476. Springer, Cham. https://doi.org/10.1007/978-3-319-26823-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-26823-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26822-4
Online ISBN: 978-3-319-26823-1
eBook Packages: Computer ScienceComputer Science (R0)