Skip to main content

A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

Abstract

Trust computation and management are significant areas of research in mobile ad hoc networks, since the mobile nodes are vulnerable to security threats. A trust mechanism allows the participating nodes to maintain trust relationships among themselves, by evaluating one another and deciding which nodes can interact with one another and whether they can. In this paper, a trust model for the directory-based service discovery is proposed, using the Dezert-Smarandache Theory (DSmT). The trust value of a node is computed by another node, based on the behavior of nodes, when a service provider node provides the service to the requesting node, during the service discovery process. An evidential theory, DSmT handles uncertain and paradoxical information that may arise from the fusion of several sources of evidences. Simulations were carried out, to analyze trust values of the requester nodes and packet delivery ratio, to show the efficiency of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cho, J.H., Swami, A.: A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tut. 13(4), 562–583 (2011)

    Article  Google Scholar 

  2. Cho, J.H., Swami, A., Chen, I.R.: Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. In: 12th IEEE International Conference on Computational Science and Engineering, pp. 641–650. IEEE Press, New York (2009)

    Google Scholar 

  3. Cook, K.S. (ed.): Trust in Society. Russell Sage Foundation Series on Trust, New York (2003)

    Google Scholar 

  4. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, New Jersey (1976)

    MATH  Google Scholar 

  5. Dezert, J.: Foundations for a New Theory of Plausible and Paradoxical Reasoning. Information and Security 9, 13–57 (2002)

    Google Scholar 

  6. Dempster, A.P.: Upper and Lower Probabilities Induced by Multivalued Mapping. Annals of Mathematical Statistics 28, 325–339 (1967)

    Article  MathSciNet  Google Scholar 

  7. Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory. Sandia Na-tional Laboratories, Albuquerque, New Mexico (2002)

    Google Scholar 

  8. Deepa, R., Swamynathan, S.: The DBF-based Semantic Service Discovery for Mobile Ad Hoc Networks. Canadian Journal Electrical and Computer Engineering (accepted for Publication, 2014)

    Google Scholar 

  9. Deepa, R., Swamynathan, S.: AHP-Entropy-TOPSIS based Clustering Protocol for Mobile Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks. Old City Publishing (accepted for publication, 2014)

    Google Scholar 

  10. Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey. IEEE Commun. Surv. Tut. 14(2), 279–298 (2012)

    Article  Google Scholar 

  11. Kumar, A., Aggarwal, A.: Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 240–251. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Campo, C., Almenárez, F., Díaz, D., García-Rubio, C., López, A.M.: Secure Service Discovery based on Trust Management for Ad-hoc Networks. J. Univer. Comput. Sci. 12(3), 340–356 (2006)

    Google Scholar 

  13. Han, S., Kim, J.M., Bin, H.: Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network. In: International Conference on Information Science and Security, pp. 171–176 (2008)

    Google Scholar 

  14. McNamara, L., Mascolo, C., Capra, L.: Trust and Mobility Aware Service Provision for Pervasive Computing. In: 1st International Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, pp. 603–610 (2006)

    Google Scholar 

  15. Ahamed, S.I., Sharmin, M.: A trust-based secure service discovery (TSSD) model for per-vasive computing. Computer Communications 31(18), 4281–4293 (2008)

    Article  Google Scholar 

  16. Glowacka, J., Amanowicz, M.: Application of Dezert-Smarandache theory for tactical MANET security enhancement. In: IEEE Military Communications and Information Systems Conference, pp. 1–6 (2012)

    Google Scholar 

  17. Guo, D., Wu, J., Chen, H., Yuan, Y., Luo, X.: The Dynamic Bloom Filters. IEEE T. Knowl. Data En. 22(1), 120–133 (2010)

    Article  Google Scholar 

  18. Smarandache, F., Dezert, J.: Advances and Applications of DSmT for Information Fusion, Collected works. Arp Publishers (2004)

    Google Scholar 

  19. Wang, J., Sun, H.J.: A new evidential trust model for open communities. Comput. Stand. Inter. 31(5), 994–1001 (2009)

    Article  Google Scholar 

  20. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: 27th Australian Conference on Computer Science, pp. 47–54 (2004)

    Google Scholar 

  21. Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Conference on Elec-tronic Commerce, pp. 17–19 (2002)

    Google Scholar 

  22. Feng, R., Che, S., Wang, X., Yu, N.: Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks. Int. J. Distrib. Sens. N, 1–9 (2013)

    Google Scholar 

  23. The Network Simulator, ns-2, available from World Wide Web, http://nsnam.isi.edu/nsnam

  24. Yoon, J., Liu, M., Noble, B.: Random Waypoint Considered Harmful. In: 22nd Annual Joint Conference on IEEE Computer and Communications, pp. 1312–1321 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deepa, R., Swamynathan, S. (2014). A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics