Summary
In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, the absence of any trusted third party in such networks may result in nodes deviating from the routing protocol for selfish or malicious reasons. The concept of trusted routing has been promoted to handle the problems selfish and malicious nodes cause to the network. In this paper, we focus on using trust in routing, and show how trust can mitigate against malicious behaviour.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the 1st ACM workshop on Wireless security, pp. 21–30 (2002)
Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell, Malden (1988)
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13(2), 119–154 (2006)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (1994)
Perkins, C., Royer, E.M., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561 (2003)
Pirzada, A.A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wireless Personal Communications 37(1–2), 139–168 (2006)
Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. on Mobile Computing 5(6), 695–710 (2006)
Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowledge Engineering Review 19(1), 1–25 (2004)
Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Proceedings of the 1st Int. Conf. on Autonomous Agents in Multi-Agent Systems, pp. 475–482 (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE Int. Conf. on Network Protocols, pp. 78–89 (2002)
Selçuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. In: IEEE/ACM Int. Symposium on Cluster Computing and the Grid, pp. 251–258 (2004)
Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24–34 (2005)
Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Trans. on Knowledge and Data Engineering 16(7), 843–857 (2004)
Zhou, L., Haas, Z.J.: Securing ad-hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Griffiths, N., Jhumka, A., Dawson, A., Myers, R. (2008). A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks. In: Badica, C., Mangioni, G., Carchiolo, V., Burdescu, D.D. (eds) Intelligent Distributed Computing, Systems and Applications. Studies in Computational Intelligence, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85257-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-85257-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85256-8
Online ISBN: 978-3-540-85257-5
eBook Packages: EngineeringEngineering (R0)