Advertisement

Secure Trust Metadata Management for Mobile Ad-Hoc Networks

  • Vivek Natarajan
  • Yi Yang
  • Sencun Zhu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Abstract

A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Trust metadata created by individual nodes, based on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure semantics-aware trust metadata management scheme to partition and store an information network of trust metadata of nodes in a MANET. That is, trust metadata is securely propagated to and stored at certain geographic locations inside the network itself, based on its semantics. The TA can send queries of various types in the network to obtain the trust metadata of its interest. This scheme is robust to several security attacks that attempt to disrupt the availability of trust metadata in the network. Our analysis shows that the proposed scheme provides desirable security and functionality properties with low query overhead.

Keywords

Mobile Ad-Hoc Network Trust Metadata Management Semantics-Aware Attribute-Based Encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, W., Joshi, A., Finin, T.: Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach. In: Proc. IEEE MDM (2010)Google Scholar
  2. 2.
    Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. Proc. IEEE Communications Magazine 46, 108–114 (2008)Google Scholar
  3. 3.
    Sun, Y., Yu, W., Han, Z., Liu, K.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. Proc. IEEE Journal on Selected Areas in Communications 24, 305–317 (2006)zbMATHCrossRefGoogle Scholar
  4. 4.
    Velloso, P., Laufer, R., Cunha, D., Duarte, O., Pujolle, G.: Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model. Proc. IEEE Transactions on Network and Service Management 7, 172–185 (2010)CrossRefGoogle Scholar
  5. 5.
    Balakrishnan, V., Varadharajan, V., Tupakula, U., Lues, P.: TEAM: Trust Enhanced Security Architecture for Mobile Ad-Hoc Networks. In: Proc. IEEE ICON (2007)Google Scholar
  6. 6.
    Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom (2000)Google Scholar
  7. 7.
    Karp, B., Kung, H.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. ACM MobiCom (2000)Google Scholar
  8. 8.
    Wang, Y., Singh, M.: Trust Representation and Aggregation in a Distributed Agent System. In: Proc. ACM AAAI (2006)Google Scholar
  9. 9.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: Proc. ACM CCS (2006)Google Scholar
  10. 10.
    Yu, S., Ren, K., Lou, W.: FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. In: Proc. IEEE INFOCOM (2009)Google Scholar
  11. 11.
    Falcone, R., Pezzulo, G., Castelfranchi, C.: A Fuzzy Approach to a Belief-Based Trust Computation. In: Proc. ACM AAMAS (2002)Google Scholar
  12. 12.
    Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Adhoc Networks: a Survey. Proc. IEEE Communications Surveys and Tutorials 14, 279–298 (2011)CrossRefGoogle Scholar
  13. 13.
    Zhu, B., Wan, Z., Kankanhalli, M., Bao, F., Deng, R.: Anonymous Secure Routing in Mobile Ad-Hoc Networks. In: Proc. IEEE Local Computer Networks (2004)Google Scholar
  14. 14.
    GloMoSim: Global Mobile Information Systems Simulation Library, http://pcl.cs.ucla.edu/projects/glomosim
  15. 15.
    Sun, Y., Han, Z., Liu, K.: Defense of Trust Management Vulnerabilities in Distributed Networks. Proc. IEEE Communications Magazine. 46, 112–119 (2008)CrossRefGoogle Scholar
  16. 16.
    Natarajan, V., Zhu, S., Srivatsa, M., Opper, J.: Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks. In: Proc. IEEE AINA (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Vivek Natarajan
    • 1
  • Yi Yang
    • 2
  • Sencun Zhu
    • 1
  1. 1.Department of Computer Science and EngineeringPennsylvania State UniversityUSA
  2. 2.Department of Electrical Engineering and Computer ScienceCatholic University of AmericaUSA

Personalised recommendations