Abstract
A model for computing trust inwirelessad-hoc networks has been proposed. The model is based on the societal approach towards building a trustedcommunity, where trust is builtup slowly, but decreases to zero on asingle detectable misbehavior.Successive trust build-ups depend on past behavior. Wireless channel loss probability has also been considered in the model.Extensive simulation has been conducted to evaluate the model under different conditions.A system level approach for incorporating the model in a real-life ad-hoc network testbed hasalsobeen discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
Alfarez Abdul-Rahman & Stephen Hailes, “A Distributed Trust Model”, ACM New Security Paradigm Workshop, 1997.
Matt Blaze, Joan Feigenbaum, Jack Lacy, “Decentralized Trust Management”, inProc. IEEE Conference on Security and Privacy, Oakland, CA, May 1996.
Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, “Mitigating Routing Misbehavior in MobileAd-hocNetworks”, inProceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, United States, August 06 - 11, 2000.
Zheng Yan, Peng Zhang, Teemupekka Virtanen, “Trust Evaluation Based Security Solution inAd-hocNetworks”, inProc. of NordSec 2003, Norway, 2003.
Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad-hoc Networks”, appeared in 27th Australian Computer Science Conference, The Univ. of Otago, Dunedin, New Zealand, 2004.
J. Li, R. Li, J. Kato, “Future Trust Management Framework for Mobile Ad-hoc Networks”,IEEE Communications Magazine, April 2008.
Y. L. Sun, Z. Han, W. Yu, K.J.R. Liu, “Attacks on Trust Evaluation in Distributed Networks”, in Proc. of the 40th annual conference on Information Science and Systems (CISS), Princeton, NJ, March 2006.
Xiaoqi Li, Michael R. Lyu, Jiangchuan Liu, “A Trust Model Based Routing Protocol for SecureAd-hocNetworks”,Proceedings 2004 IEEE Aerospace Conference,Big Sky, Montana, U.S.A., March 6–13 2004.
A. Josang, “A Logic for Uncertain Probabilities”,International Journal of Uncertainty, Fuzziness and Knowledge-based Systems,vol.9(3):pp.279–311, 2001.
Sonja Buchegger and Jean-Yves Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks)”, inProceedings of the Third ACM International Symposium on MobileAd-hocNetworking and Computing(MOBIHOC ‘02),Switzerland, June 9–11, 2002.
Pietro Michiardi and Refik Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in MobileAd-hocNetworks”,inProceedings of the 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, 2002.
L. Buttyán and J.P.Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad-hocNetworks”,Mobile Network and Applications (MONET),vol.8(5), pp 579–592, 2003.
T. Ghosh, N. Pissinou, K. Makki, A. Farhat, “A Framework for Computing Trust in MobileAd-hocNetworks”,Mobile and Wireless Network Security and Privacy, by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007.
AODV Implementation, (AODV-UU), Department of Information Technology, Uppsala University (Sweden), http://core.it.uu.se/core/index.php/AODV-UU.
Peter Reiher, et al., “Research Direction in Security and Privacy for Mobile and Wireless Networks”,Technical Report to National Science Foundation, July 2006.
T. Ghosh, B. Pratt, “Routing Table Instability in Real-world Ad-Hoc Network Testbed”,Advances in Computer and Information Science and Engineering, by Sobh, T. (Ed). Springer, ISBN 978-1-4020-8740-0, 2008.
S. Buchegger, C. Tissieres, J.L.Boudec,”A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks–HowMuch Can Watchdogs Really Do?”inProceedings of IEEE WMCSA ‘04, English Lake District,UK, December 2004.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Ghosh, T., Xu, H. (2010). Modeling Trust in Wireless Ad-Hoc Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_37
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_37
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)