A dynamic trust model for mobile ad hoc networks

This paper introduces a trust model for mobile ad hoc networks. Initially each node is assigned a trust level. Then we use several approaches to dynamically update trust levels by using reports from threat detection tools, such as intrusion detection systems (IDS), located on all nodes in the network. The nodes neighboring to a node exhibiting suspicious behavior initiate trust reports. These trust reports are propagated through the network using one of our proposed methods. A source node can use the trust levels it establishes for other nodes to evaluate the security of routes to destination nodes. Using these trust levels as a guide, the source node can then select a route that meets the security requirements of the message to be transmitted. This paper demonstrates important concepts for establishing a collaborative, dynamic trust model and for using this model as an example to enhance the security of message routing in mobile ad hoc networks.

[1]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Sonja Buchegger,et al.  Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness , 2002, GI Jahrestagung.

[3]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[4]  Michael K. Reiter,et al.  Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.

[5]  Bharat Bhargava,et al.  Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks , 2002 .

[6]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[7]  Xia Wang Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[9]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[12]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[13]  Andrew T. Campbell,et al.  P-MIP: Paging Extensions for Mobile IP , 2002, Mob. Networks Appl..