Abstract
As wireless network applications evolve, they require interaction between many entities (protocols, middleware etc), and an increasing requirement for the design of secure applications among the entities is trust management. Consequently, many new attacks against networks are aimed at the trust management. In this paper, we develop a new trust management framework (TMF) for wireless networks. The proposed framework applies Grey theory combined with Fuzzy Sets to calculate a node’s trust value based on observations from neighbour nodes’. The new TMF employs multiple rather than a single parameter to decide the resulting trust value. Simulations conducted in an 802.11 based wireless network show that the new framework can not only identify abnormal trust behaviour, but can also effectively find which aspect of the metrics used to establish the trust value for a node are abnormal, and hence identify the strategy the attacker is using against the TMF.
Chapter PDF
References
Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. IEEE Communications Magazine 46(2), 108–114 (2008)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002 (September 2002)
Li, H., Singhal, M.: Trust Management in Distributed Systems. IEEE Computer Society 40, 45–53 (2007)
Sun, Y.L., Yu, W., Han, Z., Ray Liu, K.J.: Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks. IEEE Journal of Selected Areas in Communications (J-SAC) 24(2), 305–317 (2006)
Tuan, T.A.: A Game-Theoretic Analysis of Trust Management in P2P Systems. In: First International Conference on ICCE 2006, pp. 130–134 (October 2006)
Qin, Z., Jia, Z., Chen, X.: Fuzzy Dynamic Programming based Trusted Routing Decision in Mobile Ad Hoc Networks, Embedded Computing. In: Fifth IEEE International Symposium on Embedded Computing, SEC 2008, pp. 180–185 (2008)
Julong, D.: Introduction to Grey Theory. Huazhong University of Science & Technology Press, Wuhan (2002)
Cai, F., Fugui, T., Yongquan, C., Ming, L., Bing, P.: Grey Theory Based Nodes Risk Assessment in P2P Networks. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 479–483 (2009)
Deng, J.: A Course in Grey Systems. Huazhong University of Science and Technology Press, Wuhan (1990)
Song, Q., Jamalipour, A.: Network Selection in An Integrated Wireless LAN and UMTS Environment Using Mathematical Modeling and Computing Techniques. IEEE Wireless Communication, 42–48 (June 2005)
Sun, Y.L., Han, Z., Liu, K.J.R.: Defense of Trust Management Vulnerabilities in Distributed networks. IEEE Communications Magazine 46(2), 112–119 (2008)
Hong, L., Chen, W., Gao, L., Zhang, G., Fu, C.: Grey theory based reputation system for Secure Neighbor Discovery in Wireless Ad Hoc Networks. In: 2nd International Conference on Future Computer and Communication (ICFCC), vol. 2, pp. 749–754 (2010)
Liu, S., Lin, Y.: Grey Information: Theory and Practical Applications. Springer, London (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 International Federation for Information Processing
About this paper
Cite this paper
Guo, J., Marshall, A., Zhou, B. (2011). A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds) Trust Management V. IFIPTM 2011. IFIP Advances in Information and Communication Technology, vol 358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22200-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-22200-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22199-6
Online ISBN: 978-3-642-22200-9
eBook Packages: Computer ScienceComputer Science (R0)