A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks

Robust trust and reputation evaluation services are significant to ensure the security of mobile ad hoc networks, as centralized administration is not easy to be applied and these networks do not have fixed infrastructures. However, malicious behaviors obviously can make wireless and mobile networks at risk so malicious nodes should be detected and excluded. In this paper, we study the issue of how to evaluate efficiently a node's reputation in a distributed approach. First, a set of management mechanisms is presented to prevent effectively malicious nodes from entering the trusted community. Then we formulate a comprehensive computational reputation model. Through a set of extensive simulation experiments based on the ns-2 simulator, our simulation results demonstrate that our system indeed are more sensitive to suspicious behaviors and peers, and thereby improper behaviors within a community are prevented effectively. Therefore, in dynamic but agile environments, our computational reputation system exhibits high adaptation and low complexity, so that it leads to secure communication among mobile nodes.

[1]  Azzedine Boukerche,et al.  Performance evaluation of an anonymity providing protocol for wireless ad hoc networks , 2006, Perform. Evaluation.

[2]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Muthucumaru Maheswaran,et al.  A secured hierarchical trust management framework for public computing utilities , 2005, CASCON.

[4]  Françoise Sailhan,et al.  Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.

[5]  Paolo Santi,et al.  A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks , 2006, DIWANS '06.

[6]  Ioanis Nikolaidis,et al.  Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.

[7]  Narayan B. Mandayam,et al.  Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[8]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[9]  Ala I. Al-Fuqaha,et al.  A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network , 2007, IWCMC.

[10]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[11]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[12]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[13]  Patrick Lynch,et al.  Why to market IT services and how to do it , 2002, SIGUCCS '02.

[14]  Partha Dasgupta,et al.  Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[15]  Matthias Klusch,et al.  Information agent technology for the Internet: A survey , 2001, Data Knowl. Eng..

[16]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[17]  Nima Haghpanah,et al.  Trusted secure routing for ad hoc networks , 2007, MobiWac '07.

[18]  James C. Browne,et al.  Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.

[19]  B. Krishnamachari,et al.  A price-based reliable routing game in wireless networks , 2006, International ICST Conference on Game Theory for Networks.

[20]  Xin Sui,et al.  Agent trust evaluation and team formation in heterogeneous organizations , 2007, AAMAS '07.

[21]  R. Srikant,et al.  Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.

[22]  Gerd Kortuem,et al.  Disseminating trust information in wearable communities , 2006, Personal Technologies.

[23]  Azzedine Boukerche,et al.  ARMA: An Efficient Secure Ad Hoc Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[24]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[25]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[26]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.