Efficient Distribution of Trust Authority Functions in Tactical Networks

In this paper we describe an algorithm for the distribution of trust authority functions such as key generation and distribution in tactical mobile ad hoc networks. Such networks cannot rely on existing infrastructures and must operate under severe resource constraints. Moreover, network partitioning and node failure, including Byzantine failures must be compensated in tactical networks. We propose the combination of metrics on both network state and beliefs or trust in other nodes to form a composite metric for use in a clustering algorithm. The effectiveness and other characteristics of this improved clustering algorithm are then evaluated and analyzed in a simulation environment, demonstrating a significant improvement over the baseline clustering algorithm.

[1]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[2]  Xiang-Yang Li,et al.  Distributed low-cost backbone formation for wireless ad hoc networks , 2005, MobiHoc '05.

[3]  Anthony Ephremides,et al.  The Design and Simulation of a Mobile Radio Network with Distributed Control , 1984, IEEE J. Sel. Areas Commun..

[4]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[5]  Sean W. Smith,et al.  Modeling Public Key Infrastructures in the Real World , 2005, EuroPKI.

[6]  Kemal Bicakci,et al.  How to incorporate revocation status information into the trust metrics for public-key certification , 2005, SAC '05.

[7]  Ravi Prakash,et al.  Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[8]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Ling Liu,et al.  Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .

[10]  Robbert van Renesse,et al.  MISTRAL: efficient flooding in mobile ad-hoc networks , 2006, MobiHoc '06.

[11]  Michael K. Reiter,et al.  Authentication metric analysis and design , 1999, TSEC.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[14]  Ueli Maurer,et al.  Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.

[15]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[16]  R. Lombardi,et al.  An instrument for the characterization of voltage and temperature profile in NiCd and NiMH batteries , 1997, Proceedings 23rd Euromicro Conference New Frontiers of Information Technology - Short Contributions -.

[17]  Feipei Lai,et al.  SWARM: Secure Wireless Ad-hoc network Reliance Management , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[18]  Stefan Appel Lokalisierung von Knoten in mobilen Ad-hoc-Netzen ohne zusätzliche Infrastruktur , 2006 .

[19]  Mario Gerla,et al.  Efficient flooding with Passive Clustering (PC) in ad hoc networks , 2002, CCRV.

[20]  Kemal Ertugrul Tepe,et al.  A high performance cluster-based broadcasting algorithm for wireless ad hoc networks based on a novel gateway selection approach , 2005, PE-WASUN '05.

[21]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[22]  Zongpeng Li,et al.  Probabilistic Power Management for Wireless Ad Hoc Networks , 2005, Mob. Networks Appl..

[23]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[24]  Imrich Chlamtac,et al.  An Energy-Efficient Method for Nodes Assignment in Cluster-Based Ad Hoc Networks , 2004, Wirel. Networks.