Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks

The multicast mobile ad-hoc network (multicast MANET) is proposed for a sender sending packets to several receivers through a multicast session. Since members of a multicast group changes frequently, the issue of supporting secure authentication and authorization in multicast MANET becomes more critical than the network provided a fixed central authentication (CA) server. This work thus proposes a two-step secure authentication approach for the multicast MANET. First, a Markov chain trust model is proposed to determine the trust value (TV) for each one-hop neighbors. A nodepsilas trust value is analyzed from its previous trust manner in this group. The proposed trust model is proven as an ergodic continuous-time Markov chain model. Second, a node with the highest TV of a group will be selected as the CA server. For increasing reliability, the node with the second highest TV will be selected as the backup CA server that will take over CA when CA fails. The procedures of the secure authentication for group management are detailed. The security analysis of each procedure is analyzed to guarantee that the proposed approach achieves a secure reliable authentication in multicast MANET. Numerical results indicate that the analytical trust value of each mobile node is very close to that of simulation under various situations. The speed of the convergence of the analytical trust value shows that the analytical results are independent of initial values and the trust classes.

[1]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[2]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[3]  Xiaoyan Hong,et al.  Modeling Ad-hoc rushing attack in a negligibility-based security framework , 2006, WiSe '06.

[4]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[5]  Yue Xu,et al.  An Analysis of Trust Transitivity Taking Base Rate into Account , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[6]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[7]  Ling Liu,et al.  Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .

[8]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[10]  Junde Song,et al.  Strategy proof trust management in wireless ad hoc network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[11]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[12]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[13]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[14]  Dickson K. W. Chiu,et al.  Supporting the legal identities of contracting agents with an agent authorization platform , 2005, ICEC '05.

[15]  Xiaoyan Hong,et al.  A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.

[16]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[17]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[18]  P. Papadimitratos Secure ad hoc networking , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[19]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[22]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[23]  Enrico Macii,et al.  Markovian analysis of large finite state machines , 1996, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[24]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[25]  Taylor Yu The Kerberos Network Authentication Service (Version 5) , 2007 .

[26]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[27]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[28]  Richard N. Taylor,et al.  Architectural support for trust models in decentralized applications , 2006, ICSE.

[29]  Evangelos Kotsovinos,et al.  BambooTrust: practical scalable trust management for global public computing , 2006, SAC.

[30]  Archana Bharathidasan,et al.  Sensor Networks : An Overview , 2002 .

[31]  Prashant Sharma,et al.  Secure multicast model for ad-hoc military networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[32]  Mahalingam Ramkumar,et al.  Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).