Authentication and trust management in an adhoc network is a challenging task. Cryptography and other hard approaches do not provide a quantitative measurement of trust. Also, trust assignment to a new node having no history of any previous transaction had not been concrete. Human society authenticates people dynamically. This paper proposes a new strategy involving two parameters alpha and beta, which authenticates a node in a mobile adhoc network drawing inspiration from the way authentication, is done in a human society. The alpha parameter gives the quantitative measurement of seeking trust, and the beta parameter gives the quantitative measurement of assigning trust. The dynamism of trust change in a cluster of nodes is also explained by introducing time credit point, service credit point and discredit point. The strategy proposes to use a downloadable active security component from the trust authentication authority, rather than any passive certificate or encryption based authentication. This paper also says how to choose next trust authority in case the primary authority fails
[1]
Munindar P. Singh,et al.
An evidential model of distributed reputation management
,
2002,
AAMAS '02.
[2]
Karl Aberer,et al.
P-Grid: A Self-Organizing Access Structure for P2P Information Systems
,
2001,
CoopIS.
[3]
Beng Chin Ooi,et al.
Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques
,
2003,
WAIM.
[4]
Karl Aberer,et al.
Managing trust in a peer-2-peer information system
,
2001,
CIKM '01.
[5]
Stephen Hailes,et al.
A distributed trust model
,
1998,
NSPW '97.
[6]
Dharma P. Agrawal,et al.
A novel authentication scheme for ad hoc networks
,
2000,
2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[7]
André Weimerskirch,et al.
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
,
2001,
ICISC.