Trust Management Scheme for Mobile Ad-Hoc Networks

The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust level and node level trust monitoring. The main contribution of this work is in the introduction of a Node-based Trust Management (NTM) scheme in MANET based on the assumption that individual nodes are themselves responsible for their own trust level. We explore and develop the mathematical framework of trust in NTM. We have defined a proposed metrics for nodes to establish and manage trust. We also have presented some new algorithms for trust formation in MANETs based on experience characteristics offered by nodes.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Xiaoyan Hong,et al.  Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..

[3]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  Todd Hughes,et al.  Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .

[6]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[7]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[8]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[9]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[10]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[11]  Shambhu Upadhyaya,et al.  Securing Information through Trust Management in Wireless Networks , 2004 .

[12]  Markus Straßer,et al.  A fault-tolerant protocol for providing the exactly-once property of mobile agents , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[13]  Dhiraj K. Pradhan,et al.  A Cluster-based Approach for Routing in Ad-Hoc Networks , 1995, Symposium on Mobile and Location-Independent Computing.

[14]  David J. Scott,et al.  Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.

[15]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[16]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[17]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[18]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[19]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[20]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[21]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[22]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[23]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[24]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[25]  Abdul Sattar,et al.  Trust Formalization in Mobile Ad-Hoc Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[26]  Boi Faltings,et al.  An incentive compatible reputation mechanism , 2003, AAMAS '03.

[27]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[28]  P. Dewan,et al.  Securing P2P networks using peer reputations: is there a silver bullet? , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.

[29]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .