A Survey on Trust and Reputation Schemes in Ad Hoc Networks

The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. There is a natural incentive for nodes to only consume, but not contribute to the services of the system. Intentional misbehavior can aim at an advantage for the misbehaving node or just constitute vandalism, such as enabling a malicious node to mount an attack or a selfish node to save power. The use of reputation systems in many different areas of IT is increasing because of their widely publicized use in online auctions and product reviews. Reputation systems are used to decide who to trust, and to encourage trustworthy behavior. In this paper we introduce the concept, goals, features and architecture of reputation systems and survey the reputation and trust based security schemes that were proposed for ad hoc networks. Finally we conclude this paper.

[1]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[2]  Masoud Sabaei,et al.  An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).

[3]  Dimitrios Vogiatzis,et al.  Security and Cooperation in clustered mobile ad hoc networks with centralized supervision , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Reijo Savola,et al.  Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[5]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[6]  Jaesheung Shin,et al.  Secure reporting of traffic forwarding activity in mobile ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[7]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[8]  Pang-Ning Tan,et al.  Local Detection of Selfish Routing Behavior in Ad Hoc Networks , 2006, J. Interconnect. Networks.

[9]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[10]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Vijay Varadharajan,et al.  Trust and Recommendations in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).

[12]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[13]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[14]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.