Towards Identifying Features of Trust in Mobile Ad Hoc Network

In a mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data transmission process. The higher the numbers of nodes that trust each other in the network means the higher successful communication process rates could be expected. To determine trust, there are several criteria need to be considered. These criteria which are also known as features or evidences can be used to represent each node's trust properties in the trust evaluation process prior to initiating certain packet forwarding task. Nodes that are able to present valid features requested by source node will be included in the MANET operations. The aim of this paper is to provide an overview of security vulnerabilities in MANET and the use of trust concept to enhance the security. This paper also discusses several potential features that have been used in existing works which are expected to be suitable to be used in the trust evaluation process to create a trusted MANET community.

[1]  Mukesh Singhal,et al.  A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[2]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[4]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[5]  Azzedine Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[6]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[7]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[8]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[9]  Zhuoqing Morley Mao,et al.  Toward understanding distributed blackhole placement , 2004, WORM '04.

[10]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[11]  Loay Abusalah,et al.  TARP: trust-aware routing protocol , 2006, IWCMC '06.

[12]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[13]  George Kesidis,et al.  Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[14]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[15]  Xia Wang,et al.  Specification Synthesis for Monitoring and Analysis of MANET Protocols , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[16]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..