Abstract
In wireless ad-hoc networks, all nodes need to have functions able to authenticate each other and so it is critical to know the trustworthiness of each node in such environments. This paper proposes an authentication system for ad-hoc networks, based on a clustering and trust model. Firstly, methods of solving authentication problems, which occur in ad-hoc networks, are discussed. Next, fuzzy logic inference is introduced, which is used as a trust evaluation method for each node and provides both local and global trust values. The reputation is used in the calculation of the trust value. Using the trust value of a trustor, a more sophisticated trust value can be computed. If a node moves from one cluster to another, the trust level of the node is determined by the certificate issued by the previous introducers. In addition, it is demonstrated that the proposed model can monitor and isolate malicious nodes in order to provide enhancements to the network’s overall authentication rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shieh, S.W., Wallach, D.S.: Guest Editors’ Introduction: Ad Hoc and P2P Security. IEEE Internet Computing 9(6), 14–15 (2005)
Zhong, Y., Bhargava, B.: Authorization based on evidence and trust. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 94–103. Springer, Heidelberg (2002)
Chadwick, D.W.: Operational Models for Reputation Servers. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 108–115. Springer, Heidelberg (2005)
Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)
Ngai, E.C.H., Lyu, M.R.: An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1st edn. (2006)
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Gambetta, D.G.: Can we trust trust? In: Gambetta, D.G. (ed.), ch. 13, pp. 213–237. Basil Blackwell, New York (1988)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04. University of Minnesota, Management Information Systems Reseach Center (1996)
Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)
Sun, Y.L., Han, Z., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 46(2), 112–119 (2008)
Amis, A.D., Prakash, R., Vuong, T.H.P., Huynh, D.T.: Max-min D-cluster Formation in Wireless Ad Hoc Network. In: Proc. of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 2000), pp. 32–41 (March 2000)
Jin, S.-H., Park, C.-I., Choi, D.-S., Chung, K.-I., Yoon, H.-S.: Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network. ETRI Journal 27(4) (2005)
Massa, P.: Trust-aware Decentralized Recommender Systems: PhD research proposal. Technical Report No.T04-06-07, Istituto Trentino di Cultura (2004)
Schein, A.I., Popescul, A., Ungar, L.H., Pennock, D.M.: Methods and Metrics for Cold-Start Recommendations. In: ACM SIGIR 2002, Finland (August 2002)
Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24–34 (2005)
Park, S.-S., Lee, J.-H., Chung, T.-M.: Cluster-Based Trust Model against Attacks in Ad-Hoc Networks. In: 2008 Third International Conference on Convergence and Hybrid Information Technology, iccit, vol. 1, pp. 526–532 (2008)
Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Compuing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)
Fuzzy Logic Toolbox User’s guide, The MathWorks, Inc. (2001), http://vyuka.fel.zcu.cz/kae/anf/fuzzy_tb.pdf
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. ACM Conference World Wide Web (WWW 2003), pp. 640–651. ACM Press, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, SS., Lee, JH., Chung, TM. (2009). Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-02457-3_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02456-6
Online ISBN: 978-3-642-02457-3
eBook Packages: Computer ScienceComputer Science (R0)