Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks

As the use of mobile ad hoc networks spreads beyond personal networks to practical military and commercial applications, addressing security issues becomes extremely important in this area. However, mobile networks are more susceptible to malicious behavior; thus, an effective node evaluation mechanism can prevent malicious nodes from initiating attacks and tampering the data communications process in these networks. In this article, we formalize the node evaluation problem, discuss its challenges, and present possible solutions. Moreover, we propose a novel node evaluation solution with the assistance of trustworthy neighboring nodes, which allows a mobile node to more effectively evaluate its neighbors based on the additional trust information from selected neighboring nodes. Our schemes can thus enhance the security of a network and improve the effectiveness of node evaluation. Finally, we evaluate our node evaluation strategies and analyze their advantages when compared to existing node evaluation mechanisms used in wireless communications.

[1]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[2]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[3]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[4]  Azzedine Boukerche,et al.  Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[5]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Dai Hongjun,et al.  An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.

[7]  Marcin Seredynski,et al.  Evolution of cooperation in ad hoc networks under game theoretic model , 2006, MobiWac '06.

[8]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[9]  Ian F. Akyildiz,et al.  Mobility Management in Next Generation Wireless Systems , 1999, ICCCN.

[10]  Heejo Lee,et al.  A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[11]  Azzedine Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[12]  Xu Li,et al.  A Trust Cluster Based Key Management Protocol for Ad hoc Networks , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[13]  Stephen B. Wicker,et al.  Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[14]  Shin Yokoyama,et al.  Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[16]  Dan M. Nessett Factors Affecting Distributed System Security , 1986, 1986 IEEE Symposium on Security and Privacy.

[17]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.

[18]  Guangjie Han,et al.  A Reliable and Efficient Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Intelligent Computer Communication and Processing.