Secure Trust Management in Distributed Computing Systems

Modeling and computing trust in distributed computing systems like ad-hoc networks is very much challenging. Particularly in Wireless Sensor Networks (WSNs), where the network is formed and self-organized by relying on the almost strangers for reliable and normal operation, it is important to compute the trustworthiness of individual nodes in distributed manner. In order to find the trustworthiness of individual nodes, we propose a model that takes into consideration of various malicious behaviors of the nodes. The proposed trust and reputation model attempts to find answers to the inadequacy of the traditional authorization mechanisms to secure distributed systems. Our scheme explores the behavioral pattern of the malicious nodes or the attackers and quantifies those patterns to realize the secure trust management modeling. The proposed scheme presents secure trust and reputation modeling against selfish nodes, against malicious accuser nodes and attempts for conflict resolution. Efficacy of this model is shown through simulation results.

[1]  Mark Weiser The computer for the 21st century , 1991 .

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Steffen Staab,et al.  The Pudding of Trust , 2004, IEEE Intell. Syst..

[4]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[5]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[6]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[7]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[8]  Morris Sloman,et al.  Specifying and Analysing Trust for Internet Applications , 2002, I3E.

[9]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[10]  Nahid Shahmehri,et al.  Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[11]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[12]  Ninghui Li,et al.  DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.

[13]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[16]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.