Trust model for certificate revocation in ad hoc networks

In this paper we propose a distributed trust model for certificate revocation in ad hoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase. Furthermore, trust in a node is defined not only in terms of its potential for maliciousness, but also in terms of the quality of the service it provides. Trust in nodes where there is little or no history of interactions is determined by recommendations from other nodes. If the nodes in the network are selfish, trust is obtained by an exchange of portfolios. Bayesian networks form the underlying basis for this model.

[1]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[2]  Julita Vassileva,et al.  Bayesian Network-Based Trust Model in Peer-to-Peer Networks , 2003 .

[3]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[4]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[5]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[6]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[7]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[8]  Lionel M. Ni,et al.  Facilitating secure ad hoc service discovery in public environments , 2005, J. Syst. Softw..

[9]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[10]  Joshua Wright,et al.  Detecting Wireless LAN MAC Address Spoofing , 2003 .

[11]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[12]  Claude Crépeau,et al.  A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.

[13]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[14]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[15]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[16]  Dhananjay S. Phatak,et al.  Preemptive routing in ad hoc networks , 2003, J. Parallel Distributed Comput..

[17]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[18]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[19]  Peter T. Kirstein,et al.  Proactive seamless mobility management for future IP radio access networks , 2003, Comput. Commun..

[20]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[21]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Licia Capra,et al.  Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.