Abstract
Trust computation and management are significant areas of research in mobile ad hoc networks, since the mobile nodes are vulnerable to security threats. A trust mechanism allows the participating nodes to maintain trust relationships among themselves, by evaluating one another and deciding which nodes can interact with one another and whether they can. In this paper, a trust model for the directory-based service discovery is proposed, using the Dezert-Smarandache Theory (DSmT). The trust value of a node is computed by another node, based on the behavior of nodes, when a service provider node provides the service to the requesting node, during the service discovery process. An evidential theory, DSmT handles uncertain and paradoxical information that may arise from the fusion of several sources of evidences. Simulations were carried out, to analyze trust values of the requester nodes and packet delivery ratio, to show the efficiency of the proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cho, J.H., Swami, A.: A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tut. 13(4), 562–583 (2011)
Cho, J.H., Swami, A., Chen, I.R.: Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. In: 12th IEEE International Conference on Computational Science and Engineering, pp. 641–650. IEEE Press, New York (2009)
Cook, K.S. (ed.): Trust in Society. Russell Sage Foundation Series on Trust, New York (2003)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, New Jersey (1976)
Dezert, J.: Foundations for a New Theory of Plausible and Paradoxical Reasoning. Information and Security 9, 13–57 (2002)
Dempster, A.P.: Upper and Lower Probabilities Induced by Multivalued Mapping. Annals of Mathematical Statistics 28, 325–339 (1967)
Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory. Sandia Na-tional Laboratories, Albuquerque, New Mexico (2002)
Deepa, R., Swamynathan, S.: The DBF-based Semantic Service Discovery for Mobile Ad Hoc Networks. Canadian Journal Electrical and Computer Engineering (accepted for Publication, 2014)
Deepa, R., Swamynathan, S.: AHP-Entropy-TOPSIS based Clustering Protocol for Mobile Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks. Old City Publishing (accepted for publication, 2014)
Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey. IEEE Commun. Surv. Tut. 14(2), 279–298 (2012)
Kumar, A., Aggarwal, A.: Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 240–251. Springer, Heidelberg (2012)
Campo, C., Almenárez, F., DÃaz, D., GarcÃa-Rubio, C., López, A.M.: Secure Service Discovery based on Trust Management for Ad-hoc Networks. J. Univer. Comput. Sci. 12(3), 340–356 (2006)
Han, S., Kim, J.M., Bin, H.: Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network. In: International Conference on Information Science and Security, pp. 171–176 (2008)
McNamara, L., Mascolo, C., Capra, L.: Trust and Mobility Aware Service Provision for Pervasive Computing. In: 1st International Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, pp. 603–610 (2006)
Ahamed, S.I., Sharmin, M.: A trust-based secure service discovery (TSSD) model for per-vasive computing. Computer Communications 31(18), 4281–4293 (2008)
Glowacka, J., Amanowicz, M.: Application of Dezert-Smarandache theory for tactical MANET security enhancement. In: IEEE Military Communications and Information Systems Conference, pp. 1–6 (2012)
Guo, D., Wu, J., Chen, H., Yuan, Y., Luo, X.: The Dynamic Bloom Filters. IEEE T. Knowl. Data En. 22(1), 120–133 (2010)
Smarandache, F., Dezert, J.: Advances and Applications of DSmT for Information Fusion, Collected works. Arp Publishers (2004)
Wang, J., Sun, H.J.: A new evidential trust model for open communities. Comput. Stand. Inter. 31(5), 994–1001 (2009)
Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: 27th Australian Conference on Computer Science, pp. 47–54 (2004)
Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Conference on Elec-tronic Commerce, pp. 17–19 (2002)
Feng, R., Che, S., Wang, X., Yu, N.: Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks. Int. J. Distrib. Sens. N, 1–9 (2013)
The Network Simulator, ns-2, available from World Wide Web, http://nsnam.isi.edu/nsnam
Yoon, J., Liu, M., Noble, B.: Random Waypoint Considered Harmful. In: 22nd Annual Joint Conference on IEEE Computer and Communications, pp. 1312–1321 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deepa, R., Swamynathan, S. (2014). A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks. In: MartÃnez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)