Trust establishment in cooperative wireless networks

In cooperative wireless networks, relay nodes are used to improve the channel capacity of the system. However, the presence of malicious relays in the network may severely degrade the performance of the system. More specifically, there exists a possibility that a node refuses to cooperate when it is selected for cooperation or deliberately drop the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks using Bayesian framework. In contrast with previous schemes, this approach takes the channel state information and relay selection policy into account to derive a pure trust value for each relay node. The proposed method can be applied to any system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure.

[1]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[2]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[3]  Ulrich Müller Fall 2008 Notes on Statistical Decision Theory and Bayesian Analysis , 2008 .

[4]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[5]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[6]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[7]  Halim Yanikomeroglu,et al.  Relayer selection strategies in cellular networks with peer-to-peer relaying , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[8]  George K. Karagiannidis,et al.  Performance analysis of single relay selection in rayleigh fading , 2008, IEEE Transactions on Wireless Communications.

[9]  H. Vincent Poor,et al.  Threshold Based Relay Selection in Cooperative Wireless Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.

[11]  Nasir D. Memon,et al.  A Stochastic Model for Misbehaving Relays in Cooperative Diversity , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[12]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[13]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[14]  Vijay Varadharajan,et al.  Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[15]  Chuang Lin,et al.  Game-Based Trust Establishment for Mobile Ad Hoc Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[16]  Licia Capra Towards a human trust model for mobile ad-hoc networks , 2004 .

[17]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[18]  Zhu Han,et al.  Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels , 2009, EURASIP J. Wirel. Commun. Netw..