Trust establishment in cooperative wireless relaying networks

In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Chuang Lin,et al.  Game-Based Trust Establishment for Mobile Ad Hoc Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[2]  Raviraj S. Adve,et al.  Selection cooperation in multi-source cooperative networks , 2008, IEEE Transactions on Wireless Communications.

[3]  Licia Capra Towards a human trust model for mobile ad-hoc networks , 2004 .

[4]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[5]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[6]  Thanasis Korakis,et al.  Security Implications of Cooperative Communications in Wireless Networks , 2008, 2008 IEEE Sarnoff Symposium.

[7]  F. Richard Yu,et al.  Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.

[8]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[9]  Min Wu,et al.  Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[10]  Azzedine Boukerche,et al.  Joint authentication and quality of service provisioning in cooperative communication networks , 2012, Comput. Commun..

[11]  F. Richard Yu,et al.  Distributed Optimal Relay Selection in Wireless Cooperative Networks With Finite-State Markov Channels , 2010, IEEE Transactions on Vehicular Technology.

[12]  Klaus Wehrle,et al.  ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication , 2008, CoNEXT '08.

[13]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[14]  Vijay Varadharajan,et al.  Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[15]  Wei Yu,et al.  Joint optimization of relay strategies and resource allocations in cooperative cellular networks , 2006, IEEE Journal on Selected Areas in Communications.

[16]  Ioannis Lambadaris,et al.  Trust Management in Wireless Mobile Networks with Cooperative Communications , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[17]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[18]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[19]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[20]  Halim Yanikomeroglu,et al.  Relayer selection strategies in cellular networks with peer-to-peer relaying , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[21]  Zhu Han,et al.  Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game , 2009, IEEE Transactions on Mobile Computing.

[22]  H. Vincent Poor,et al.  Threshold Based Relay Selection in Cooperative Wireless Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[23]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.

[24]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[25]  Suhas N. Diggavi,et al.  On Cooperative Wireless Network Secrecy , 2009, IEEE INFOCOM 2009.

[26]  J. Berger Statistical Decision Theory and Bayesian Analysis , 1988 .

[27]  Ioannis Lambadaris,et al.  Throughput-optimal relay selection in multiuser cooperative relaying networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[28]  K. J. Ray Liu,et al.  Cooperative communications with relay-selection: when to cooperate and whom to cooperate with? , 2008, IEEE Transactions on Wireless Communications.

[29]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[30]  Ioannis Lambadaris,et al.  Trust establishment in cooperative wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[31]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[32]  H. Kuhn The Hungarian method for the assignment problem , 1955 .

[33]  Nasir D. Memon,et al.  A Stochastic Model for Misbehaving Relays in Cooperative Diversity , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[34]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[35]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[36]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.