Securing Information through Trust Management in Wireless Networks

Wireless networks are prone to certain information security threats that are either unique, or more pronounced for them due to the open air nature of the channel, bandwidth limitations and constantly changing topology. The concept of trust management, i.e., establishment of trust combined with trust monitoring, can be useful for mitigating the consequences of a substantial number of these threats. In this paper we introduce schemes for trust based secure information management for wireless networks. We outline trust management for both centralauthority-assisted (base-assisted) and independent adhoc networks. For base-assisted networks, we define a trust based admission control scheme, use intent graphs for trust monitoring, and a peer monitoring scheme based on actual condition review. For ad-hoc networks, we define the concept of logical and physical trust domains and introduce the idea of using domain heads for trust management.

[1]  Michael K. Molloy Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.

[2]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[3]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[4]  Todd Hughes,et al.  Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .

[5]  O. Spaniol,et al.  Establishing Pair-wise Keys for Secure Communication in Ad-Hoc Networks Seminar: Pervasive Computing SS 2004 , 2022 .

[6]  Kevin A. Kwiat,et al.  An analytical framework for reasoning about intrusions , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[7]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[8]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[9]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[10]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[11]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[12]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[13]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[14]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[15]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[16]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .