Skip to main content

Distributed Self-organized Trust Management for Mobile Ad Hoc Networks

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 293))

Included in the following conference series:

Abstract

Trust is a concept from the Social Sciences and can be defined as how much a node is willing to take the risk of trusting another one. The correct evaluation of the trust is crucial for several security mechanisms for Mobile Ad Hoc Networks (MANETs). However, the implementation of an effective trust evaluation scheme is very difficult in such networks, due to their dynamic characteristics. This work presents a trust evaluation scheme for MANETs based on a self-organized virtual trust network. To estimate the trustworthiness of other nodes, nodes form trust chains based on behavior evidences maintained within the trust network. Nodes periodically exchange their trust networks with the neighbors, providing an efficient method to disseminate trust information across the network. The scheme is fully distributed and self-organized, not requiring any trusted third party. Simulation results show that the scheme is very efficient on gathering evidences to build the trust networks. It also shows that the scheme has a very small communication and memory overhead. Besides, it is the first trust evaluation scheme evaluated under bad mouthing and newcomers attacks and it maintains its effectiveness in such scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albers, P., Camp, O., Percher, J.M., Jouga, B., Mé, L., Puttini, R.S.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proceedings of the 1st International Workshop on Wireless Information Systems (WIS 2002), pp. 1–12. ICEIS Press (April 2002)

    Google Scholar 

  2. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP 1996), p. 164. IEEE Computer Society (1996)

    Google Scholar 

  5. Boukerche, A., Ren, Y.: A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In: Proceedings of the 5th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2008), pp. 88–95. ACM Press, New York (2008)

    Chapter  Google Scholar 

  6. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing (MobiHoc 2002), pp. 226–236. ACM, New York (2002)

    Chapter  Google Scholar 

  7. Buskens, V.: Social Networks and Trust. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  8. Čapkun, S., Buttyán, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  9. Chang, B.J., Kuo, S.L., Liang, Y.H., Wang, D.Y.: Markov chain-based trust model for analyzing trust value in distributed multicasting mobile ad hoc networks 59, 1846–1863 (2009)

    Google Scholar 

  10. Dai, H., Jia, Z., Qin, Z.: Trust evaluation and dynamic routing decision based on fuzzy theory for manets. JSW – Journal of Software 4(10), 1091–1101 (2009)

    Google Scholar 

  11. Dellarocas, C.: Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In: Proceedings of the 21st International Conference on Information Systems (ICIS 2000), pp. 520–525. Association for Information Systems, Atlanta (2000)

    Google Scholar 

  12. Ghosh, T., Pissinou, N., Makki, K.: Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications 10(6), 985–995 (2005)

    Article  Google Scholar 

  13. Golbeck, J.: Computing with trust: Definition, properties, and algorithms. In: Proceedings of the 1st International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2006), pp. 1–7. IEEE Press (August 2006)

    Google Scholar 

  14. He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (WCNC 2004), pp. 825–830. IEEE Computer Society (2004)

    Google Scholar 

  15. Jiang, T., Baras, J.S.: Ant-based adaptive trust evidence distribution in manet. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), pp. 588–593. IEEE Computer Society (2004)

    Google Scholar 

  16. Khelil, A., Becker, C., Tian, J., Rothermel, K.: An epidemic model for information diffusion in manets. In: Proceedings of the 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2002), pp. 54–60. ACM, New York (2002)

    Google Scholar 

  17. Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces 63(4), 967–985 (1985)

    Google Scholar 

  18. Li, X., Slay, J., Yu, S.: Evaluating trust in mobile ad hoc networks. In: Proceedings of the 2005 Workshop of International Conference on Computational Intelligence and Security, CIS 2005. Springer (2005)

    Google Scholar 

  19. Lima, M.N., Pujolle, G., Silva, E., Santos, A.L., Albini, L.C.P.: Survivable keying for wireless ad hoc networks. In: Proceedings of the 2009 IFIP/IEEE International Symposium on Integrated Network Management (IM 2009), pp. 606–613. IEEE Communications Society (June 2009)

    Google Scholar 

  20. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Ursa: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transaction on Networking (TON) 12(6), 1049–1063 (2004)

    Article  Google Scholar 

  21. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265. ACM (2000)

    Google Scholar 

  22. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer, B.V., Deventer (2002)

    Google Scholar 

  23. Mickens, J.W., Noble, B.D.: Modeling epidemic spreading in mobile environments. In: Proceedings of the 4th ACM Workshop on Wireless Security (WiSe 2005), pp. 77–86. ACM, New York (2005)

    Chapter  Google Scholar 

  24. Ripeanu, M., Foster, I., Iamnitchi, A.: Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system. IEEE Internet Computing Journal 6 (2002)

    Google Scholar 

  25. Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006), pp. 1–13. IEEE Communications Society (2006)

    Google Scholar 

  26. Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)

    Article  MATH  Google Scholar 

  27. Sun, Z., Han, Y.L., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 112–119 (2008)

    Google Scholar 

  28. Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)

    Article  Google Scholar 

  29. Velloso, P.B., Laufer, R.P., Duarte, O.C., Pujolle, G.: A trust model robust to slander attacks in ad hoc networks. In: Proceedings of 17th International Conference on Computer Communications and Networks (ICCCN 2008), pp. 1–6. IEEE Communications Society (2008)

    Google Scholar 

  30. Virendra, M., Jadliwala, M., Ch, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), pp. 65–71. IEEE Computer Society (2005)

    Google Scholar 

  31. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks, ch. 12, pp. 103–136. Springer, New York (2006)

    Google Scholar 

  32. Zhang, X., Neglia, G., Kurose, J., Towsley, D.: Performance modeling of epidemic routing. Computer Networks 51(10), 2867–2891 (2007)

    Article  MATH  Google Scholar 

  33. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  34. Zuo, Y., Hu, W.C., O’Keefe, T.: Trust computing for social networking. In: Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG 2009), pp. 1534–1539. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Misaghi, M., da Silva, E., Albini, L.C.P. (2012). Distributed Self-organized Trust Management for Mobile Ad Hoc Networks. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30507-8_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30506-1

  • Online ISBN: 978-3-642-30507-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics