Skip to main content

Effect of Mobility on Trust in Mobile Ad-Hoc Network

  • Conference paper
Book cover Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

  • 1238 Accesses

Abstract

In MANET environment intermediate nodes on a communication path are expected to forward packets of source node towards destination node. This enhances the communication range of mobile nodes beyond their wireless transmission range. From the security point of view a proper mechanism should be there, so that nodes can trust each other for safe delivery of their data. Therefore trust establishment is considered as an important approach to defend safe communication in MANET. In the previous years several trust models have been proposed to enhance the security of mobile ad hoc network. However an important factor, mobility of node, before establishing the trust relationship among nodes is yet not discussed. In this paper trust model is been proposed. In this model the Trustworthiness of each node is calculated with the mobility factor. Minimal configuration, quick deployment and absence of central governing authority make ad hoc networks suitable for emergency situations. Natural disasters, military conflicts are some real life scenarios where trust among nodes is very important. Thus this model will be very effective in these situations. Speed of node is used to decide on the trust value for the trustee node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Liang, B., Haas, Z.H.: Virtual Backbone generation and maintenance in ad-hoc network mobility management. In: Proceedings of the IEEE INFOCOM (March 2000)

    Google Scholar 

  2. Schindelhauer, C., Lukovszki, T., Riihrup, S., Volbert, K.: Worst case mobility in ad hoc networks. In: Proceedings of the 15th Annual ACM Symposium on Parellelism in Algorithm and Architecture, pp. 230–239 (June 2003)

    Google Scholar 

  3. Grossglauser, M., Tse, D.: Mobility increases the capacity of ad-hoc wireless networks. In: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM 2001), April 22-26, pp. 1360–1369. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

  4. Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Infocom 2003 (April 2003)

    Google Scholar 

  5. Royer, E.M., Melliar-Smith, P.M., Moster, L.E.: An Analysis of the optimum node density for ad hoc networks. In: IEEE International Conference on Communication (ICC) (June 2001)

    Google Scholar 

  6. Bettsteller, C., Krause, O.: On border effects in modelling and simulation of wireless ad hoc networks. In: 3rd IEEE International Conference on Mobile and Wireless Communication Networks (MWCN) (August 2001)

    Google Scholar 

  7. Bettsteller, C., Hartenstein, H., Perez-Costa, X.: Stochastic properties of the random waypoint mobility model: Epoch length, direction distribution, and cell change rate. In: ACM MSWiM (September 2002)

    Google Scholar 

  8. Bettsteller, C.: Topology properties of ad hoc networks with random waypoint mobility. In: ACM Mobihoc (June 2003)

    Google Scholar 

  9. Sztompka, P.: Trust: A Sociological Theory, Seidman, S., Alexander, J.C.(eds.) Cambridge University Press (2000)

    Google Scholar 

  10. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet deleivery in manets. In: SASN 2005: Proceedings of 3rd ACM Workshop on Security of Ad hoc and Sensor Network (2005)

    Google Scholar 

  11. Ebinger, P., Bibmeyer, N.: TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs. In: Seventh Annual Communication Networks and Services Research Conference (2009)

    Google Scholar 

  12. Lin, G., Noubir, G., Rajaram, R.: Mobility Models for Ad hoc Network Simulation. In: IEEE Infocom 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Raikwar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Raikwar, A.K. (2012). Effect of Mobility on Trust in Mobile Ad-Hoc Network. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics