Trust Formalization in Mobile Ad-Hoc Networks

Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed via mobile nodes without any prior knowledge of the existing nodes which may not be trustworthy. Trust management appears to be a promising approach to formalize trustworthiness among these anonymous nodes. The outcome of the study is to formalize a trust mechanism for MANETs. The aim of this paper is threefold: to formalize and evaluate trust, to use trust as a basis to establish keys between nodes in MANETs, and to utilize trust as a metric for establishing secure distributed control in MANETs. We define metrics for nodes to establish and manage trust, and use this mutual trust to make decisions on establishing group and/or pair-wise keys in the network. We also review the routing protocols of ad-hoc networks with trust considerations and select Dynamic Source Routing (DSR), a protocol that can be used in distributed ad hoc network settings for path discovery.

[1]  Shambhu Upadhyaya,et al.  Securing Information through Trust Management in Wireless Networks , 2004 .

[2]  Dhiraj K. Pradhan,et al.  A Cluster-based Approach for Routing in Ad-Hoc Networks , 1995, Symposium on Mobile and Location-Independent Computing.

[3]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[4]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[5]  Todd Hughes,et al.  Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .

[6]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[9]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[10]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[11]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[12]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[13]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[14]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[15]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[16]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.