Abstract
This paper presents a new approach to assign trust levels in ad hoc networks. Our system is inspired by the human concept of trust. The trust level considers the recommendation of trustworthy neighbors and their own experience. For the recommendation computation, we take into account not only the trust level, but also its accuracy and the relationship maturity. We also propose the Recommendation Exchange Protocol (REP), which minimizes the number of exchanged messages. The results show the efficacy of the system and the influence of main parameters.
This work has been supported by CNPq.
Chapter PDF
References
Z. Liu, A. W. Joy, and R. A. Thompson, “A dynamic trust model for mobile ad hoc networks,” in IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04), (Suzhou, Chine), May 2004.
Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proceedings of the Seventh Nordic Workshop on Secure IT Systems, (NordSec’03), (GjÃ,vik, Norway), Oct. 2003.
H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communiations Magazine, pp. 70–75, Oct. 2002.
A. A. Pirzada and C. McDonald, “Establishing trust in pure ad-hoc networks,” in Proceedings of 27th Australasian Computer Science Conference (ACSC’04), (Dunedin, New Zealand), Oct. 2004.
M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in mobile ad-hoc networks,” in Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS’05), (Waltham, USA), Apr. 2005.
S. Buchegger and J.-Y. Le Boudec, “The effect of rumor spreading in reputation systems for mobile ad-hoc networks,” in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt03), (Sophia-Antipolis, France), Mar. 2003.
K. Ren, T. Li, Z. Wan, F. Bao, D. Robert H, and K. Kim, “Highly reliable trust establishment scheme in ad hoc networks,” Computer Networks, vol. 45, no. 6, pp. 687–699, Aug. 2004.
G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’04), (Philadelphia, USA), Oct. 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Velloso, P.B., Laufer, R.P., Duarte, O.C.M.B., Pujolle, G. (2006). HIT: A Human-Inspired Trust Model. In: Pujolle, G. (eds) Mobile and Wireless Communication Networks. MWCN 2006. IFIP The International Federation for Information Processing, vol 211. Springer, Boston, MA . https://doi.org/10.1007/978-0-387-34736-3_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-34736-3_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34634-2
Online ISBN: 978-0-387-34736-3
eBook Packages: Computer ScienceComputer Science (R0)