Effect of Mobility on Trust in Mobile Ad-Hoc Network
In MANET environment intermediate nodes on a communication path are expected to forward packets of source node towards destination node. This enhances the communication range of mobile nodes beyond their wireless transmission range. From the security point of view a proper mechanism should be there, so that nodes can trust each other for safe delivery of their data. Therefore trust establishment is considered as an important approach to defend safe communication in MANET. In the previous years several trust models have been proposed to enhance the security of mobile ad hoc network. However an important factor, mobility of node, before establishing the trust relationship among nodes is yet not discussed. In this paper trust model is been proposed. In this model the Trustworthiness of each node is calculated with the mobility factor. Minimal configuration, quick deployment and absence of central governing authority make ad hoc networks suitable for emergency situations. Natural disasters, military conflicts are some real life scenarios where trust among nodes is very important. Thus this model will be very effective in these situations. Speed of node is used to decide on the trust value for the trustee node.
KeywordsAd hoc network Trust Mobility Trustworthiness
Unable to display preview. Download preview PDF.
- 1.Liang, B., Haas, Z.H.: Virtual Backbone generation and maintenance in ad-hoc network mobility management. In: Proceedings of the IEEE INFOCOM (March 2000)Google Scholar
- 2.Schindelhauer, C., Lukovszki, T., Riihrup, S., Volbert, K.: Worst case mobility in ad hoc networks. In: Proceedings of the 15th Annual ACM Symposium on Parellelism in Algorithm and Architecture, pp. 230–239 (June 2003)Google Scholar
- 3.Grossglauser, M., Tse, D.: Mobility increases the capacity of ad-hoc wireless networks. In: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM 2001), April 22-26, pp. 1360–1369. IEEE Computer Society, Los Alamitos (2001)Google Scholar
- 4.Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Infocom 2003 (April 2003)Google Scholar
- 5.Royer, E.M., Melliar-Smith, P.M., Moster, L.E.: An Analysis of the optimum node density for ad hoc networks. In: IEEE International Conference on Communication (ICC) (June 2001)Google Scholar
- 6.Bettsteller, C., Krause, O.: On border effects in modelling and simulation of wireless ad hoc networks. In: 3rd IEEE International Conference on Mobile and Wireless Communication Networks (MWCN) (August 2001)Google Scholar
- 7.Bettsteller, C., Hartenstein, H., Perez-Costa, X.: Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In: ACM MSWiM (September 2002)Google Scholar
- 8.Bettsteller, C.: Topology properties of ad hoc networks with random waypoint mobility. In: ACM Mobihoc (June 2003)Google Scholar
- 9.Sztompka, P.: Trust: A Sociological Theory, Seidman, S., Alexander, J.C.(eds.) Cambridge University Press (2000)Google Scholar
- 10.Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet deleivery in manets. In: SASN 2005: Proceedings of 3rd ACM Workshop on Security of Ad hoc and Sensor Network (2005)Google Scholar
- 11.Ebinger, P., Bibmeyer, N.: TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs. In: Seventh Annual Communication Networks and Services Research Conference (2009)Google Scholar
- 12.Lin, G., Noubir, G., Rajaram, R.: Mobility Models for Ad hoc Network Simulation. In: IEEE Infocom 2004 (2004)Google Scholar