An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness

The security of wireless and mobile networks has an important influence on the performance of these networks. As a result, many approaches have been developed to enhance their security. Recently, the technique of trust and reputation evaluation has attracted much interest, since it can evaluate the trustworthiness of nodes in a centralized way. This paper addresses the issue of efficient reputation evaluation in wireless networks via a distributed approach. We first present the trust relationship between two entities before formalizing the concept of the community to be established over the trusted nodes. A generalized computational reputation prototype is formulated and a set of reputation management mechanisms is established to effectively prevent malicious nodes from entering the trusted community. Through the proof of the prototype's correctness, our system is analyzed to show how it offers provable security properties and prevents improper behaviors within a community.

[1]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[3]  Xin Sui,et al.  Agent trust evaluation and team formation in heterogeneous organizations , 2007, AAMAS '07.

[4]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[5]  Azzedine Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[6]  Françoise Sailhan,et al.  Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.

[7]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[8]  Patrick Lynch,et al.  Why to market IT services and how to do it , 2002, SIGUCCS '02.

[9]  James C. Browne,et al.  Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.

[10]  Gerd Kortuem,et al.  Disseminating Trust Information in Wearable Communities , 2000 .

[11]  Azzedine Boukerche,et al.  A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks , 2007, Q2SWinet '07.

[12]  Azzedine Boukerche,et al.  Performance evaluation of an anonymity providing protocol for wireless ad hoc networks , 2006, Perform. Evaluation.

[13]  Matthias Klusch,et al.  Information agent technology for the Internet: A survey , 2001, Data Knowl. Eng..

[14]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .