ad hoc networks.">A review of trust modeling in ad hoc networks

Purpose – Mobile ad hoc networks rely on cooperation to perform essential network mechanisms such as routing. Therefore, network performance depends to a great extent on giving participating nodes an incentive for cooperation. The level of trust among nodes is the most frequently used parameter for promoting cooperation in distributed systems. There are different models for representing trust, each of which is suited to a particular context and leads to different procedures for computing and propagating trust. The goal of this study is to analyze the most representative approaches for mobile ad hoc networks. It aims to obtain a qualitative comparison of the modeling approaches, according to the three basic components of a trust model: information gathering, information scoring and ranking, and action execution.Design/methodology/approach – The paper identifies the different tasks required by a trust system and compares the way they are implemented when the system model itself is based on information theor...

[1]  Marco Conti,et al.  Cooperation issues in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[2]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[3]  Fan Wu,et al.  On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks , 2007, MobiCom '07.

[4]  Jacques Demerjian,et al.  Cooperation monitoring issues in ad hoc networks , 2006, IWCMC '06.

[5]  Vijay Varadharajan,et al.  TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks , 2007, 2007 15th IEEE International Conference on Networks.

[6]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[7]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[8]  Farouk Kamoun,et al.  CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..

[9]  Marcin Seredynski,et al.  Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model , 2007, 2007 IEEE Symposium on Computational Intelligence and Games.

[10]  Dai Hongjun,et al.  An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.

[11]  Ravi Prakash,et al.  Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[12]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[13]  John S. Baras,et al.  Cooperation, Trust and Games in Wireless Networks , 2005 .

[14]  Pietro Michiardi,et al.  A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .

[15]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[16]  John S. Baras,et al.  Ant-based adaptive trust evidence distribution in MANET , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[17]  Petri Mähönen,et al.  Analytical Model of Cooperation in Ad Hoc Networks , 2004, Telecommun. Syst..

[18]  Hector Garcia-Molina,et al.  Identity crisis: anonymity vs reputation in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[19]  Deyi Li,et al.  A New Subjective Trust Model Based on Cloud Model , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[20]  Michael R. Lyu,et al.  An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[21]  Lu Yan,et al.  Cooperative packet relaying model for wireless ad hoc networks , 2008, FOWANC '08.

[22]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[23]  James C. Browne,et al.  Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.

[24]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[25]  Munindar P. Singh,et al.  An adaptive probabilistic trust model and its evaluation , 2008, AAMAS.

[26]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[27]  Stephen B. Wicker,et al.  Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[28]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[29]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[30]  Nima Haghpanah,et al.  Trusted secure routing for ad hoc networks , 2007, MobiWac '07.

[31]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[32]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..

[33]  K. Komathy,et al.  Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..

[34]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[35]  Stephen S. Yau,et al.  A Flexible Trust Model for Distributed Service Infrastructures , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[36]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[37]  Jordi Sabater,et al.  Trust and reputation for agent societies , 2003 .

[38]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[39]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[40]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[41]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[42]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[43]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[44]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[45]  J. Sabater-Mir,et al.  Trust and reputation for agent societies , 2002 .