Journal of Information Security

Volume 5, Issue 4 (October 2014)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

An Efficient Trusted Computing Base for MANET Security

HTML  Download Download as PDF (Size: 2967KB)  PP. 192-206  
DOI: 10.4236/jis.2014.54018    3,612 Downloads   4,678 Views  Citations

ABSTRACT

Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route data packets among themselves. Unfortunately, MANET devices, composed of untrustworthy software and hardware components, expose a large attack surface. This can be exploited by attackers to gain control over one or more devices, and wreak havoc on the MANET subnet. The approach presented in this paper to secure MANETs restricts the attack surface to a single module in MANET devices a trusted MANET module (TMM). TMMs are deliberately constrained to demand only modest memory and computational resources in the interest of further reducing the attack surface. The specific contribution of this paper is a precise characterization of simple TMM functionality suitable for any distance vector based routing protocol, to realize the broad assurance that “any node that fails to abide by the routing protocol will not be able to participate in the MANET”.

Share and Cite:

Mohanty, S. , Thotakura, V. and Ramkumar, M. (2014) An Efficient Trusted Computing Base for MANET Security. Journal of Information Security, 5, 192-206. doi: 10.4236/jis.2014.54018.

Cited by

[1] Enhanced Security using Multiple paths routine scheme in Cloud-MANETs
2022
[2] A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET
2021
[3] Energy Efficient Routing Protocol Prolonging Network Life Time For Manets
International Journal of Scientific & …, 2019
[4] Energy Efficient Routing Protocol Prolonging Network Lifetime For MANETs
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 2019
[5] Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks
Information and Communication Technology, 2018
[6] XHydra: 面向虚拟机 Xen 的安全增强架构
Journal of Frontiers of Computer Science and Technology, 2016
[7] Region Based Time Varying Addressing Scheme For Improved Mitigating Various Network Threats In Mobile Adhoc Networks For Qos Development
The International Journal Of Engineering And Science (IJES), 2015

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.