Skip to main content

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks

  • Conference paper
Computational Science and Its Applications – ICCSA 2009 (ICCSA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5593))

Included in the following conference series:

Abstract

In wireless ad-hoc networks, all nodes need to have functions able to authenticate each other and so it is critical to know the trustworthiness of each node in such environments. This paper proposes an authentication system for ad-hoc networks, based on a clustering and trust model. Firstly, methods of solving authentication problems, which occur in ad-hoc networks, are discussed. Next, fuzzy logic inference is introduced, which is used as a trust evaluation method for each node and provides both local and global trust values. The reputation is used in the calculation of the trust value. Using the trust value of a trustor, a more sophisticated trust value can be computed. If a node moves from one cluster to another, the trust level of the node is determined by the certificate issued by the previous introducers. In addition, it is demonstrated that the proposed model can monitor and isolate malicious nodes in order to provide enhancements to the network’s overall authentication rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shieh, S.W., Wallach, D.S.: Guest Editors’ Introduction: Ad Hoc and P2P Security. IEEE Internet Computing 9(6), 14–15 (2005)

    Article  Google Scholar 

  2. Zhong, Y., Bhargava, B.: Authorization based on evidence and trust. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 94–103. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Chadwick, D.W.: Operational Models for Reputation Servers. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 108–115. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)

    Article  Google Scholar 

  5. Ngai, E.C.H., Lyu, M.R.: An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1st edn. (2006)

    Google Scholar 

  6. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  7. Gambetta, D.G.: Can we trust trust? In: Gambetta, D.G. (ed.), ch. 13, pp. 213–237. Basil Blackwell, New York (1988)

    Google Scholar 

  8. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04. University of Minnesota, Management Information Systems Reseach Center (1996)

    Google Scholar 

  9. Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)

    Article  Google Scholar 

  10. Sun, Y.L., Han, Z., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 46(2), 112–119 (2008)

    Article  Google Scholar 

  11. Amis, A.D., Prakash, R., Vuong, T.H.P., Huynh, D.T.: Max-min D-cluster Formation in Wireless Ad Hoc Network. In: Proc. of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 2000), pp. 32–41 (March 2000)

    Google Scholar 

  12. Jin, S.-H., Park, C.-I., Choi, D.-S., Chung, K.-I., Yoon, H.-S.: Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network. ETRI Journal 27(4) (2005)

    Google Scholar 

  13. Massa, P.: Trust-aware Decentralized Recommender Systems: PhD research proposal. Technical Report No.T04-06-07, Istituto Trentino di Cultura (2004)

    Google Scholar 

  14. Schein, A.I., Popescul, A., Ungar, L.H., Pennock, D.M.: Methods and Metrics for Cold-Start Recommendations. In: ACM SIGIR 2002, Finland (August 2002)

    Google Scholar 

  15. Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24–34 (2005)

    Article  Google Scholar 

  16. Park, S.-S., Lee, J.-H., Chung, T.-M.: Cluster-Based Trust Model against Attacks in Ad-Hoc Networks. In: 2008 Third International Conference on Convergence and Hybrid Information Technology, iccit, vol. 1, pp. 526–532 (2008)

    Google Scholar 

  17. Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Compuing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Fuzzy Logic Toolbox User’s guide, The MathWorks, Inc. (2001), http://vyuka.fel.zcu.cz/kae/anf/fuzzy_tb.pdf

  19. Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. ACM Conference World Wide Web (WWW 2003), pp. 640–651. ACM Press, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, SS., Lee, JH., Chung, TM. (2009). Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02457-3_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02456-6

  • Online ISBN: 978-3-642-02457-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics