Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks

With the growing popularity of wireless mobile ad hoc networks (MANETs), many security concerns have arisen from MANETs especially in that misbehaving nodes pose a major threat during the construction of a trusted network. A reputation-based trust system can track the behavior of nodes and thereby proceed by rewarding well-behaving nodes and punishing misbehaving ones. However, existing techniques are usually either energy-consuming or complicated since the relevant reputation information is propagated throughout the network. In this paper, we propose a novel trust computation and management system, called TOMS, which not only establishes the new concepts of trust and community but also includes both the trust computation model and trust management mechanism. Using the results of extensive simulations, we highlight the effectiveness and efficiency of our trust system in comparison to other trust schemes in traditional protocols. Thus, TOMS is shown to be dynamic, distributed, and efficient, as well as sensitive to suspicious behaviors and peers.

[1]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[2]  Krzysztof R. Apt,et al.  Cooperative Games , 2020, A Course in Game Theory.

[3]  Ioanis Nikolaidis,et al.  Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.

[4]  Michael Richter,et al.  Determining Internet Users' Values for Private Information , 2004, PST.

[5]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[6]  Feng Bao,et al.  Computing of trust in wireless networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[7]  Jacques Demerjian,et al.  Cooperation monitoring issues in ad hoc networks , 2006, IWCMC '06.

[8]  Azzedine Boukerche,et al.  A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks , 2007, Q2SWinet '07.

[9]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[10]  Françoise Sailhan,et al.  Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.

[11]  Azzedine Boukerche,et al.  Performance evaluation of an anonymity providing protocol for wireless ad hoc networks , 2006, Perform. Evaluation.

[12]  Tao Jiang,et al.  Cooperative games, phase transitions on graphs and distributed trust in MANET , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[15]  Amitava Datta,et al.  Dependable Dynamic Source Routing without a Trusted Third Party , 2005, ACSC.

[16]  Luciano Bononi,et al.  Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks , 2007, International Journal of Information Security.

[17]  Indranil Sengupta,et al.  A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks , 2007, 2007 International Conference on Computing: Theory and Applications (ICCTA'07).