Abstract
Ad hoc networks are vulnerable to many types of attacks. Their success will undoubtedly depend on the trust they bring to their users. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. This paper expands on relevant fuzzy logic concepts to propose an approach to establish quantifiable trust levels between the nodes of Ad hoc networks. The proposed solution defines additional operators to fuzzy logic in order to find an end to end route which is free of malicious nodes with collaborative effort from the neighbors. In our scheme (RTIC) the path with more trusted decision value is selected as a secure route from source to destination. In order to prove the applicability of the proposed solution, we demonstrate the performance of our model through NS-2 simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ghosh, T., Pissinou, N., Makki, K.: Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications 10, 985–995 (2005)
Luo, H., Lu, S.: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks. IEEE/ACM Transactions on Networking 1, 1049–1063 (2004)
Velloso, P.B., Laufer, R.P., Duarte, O.C., Pujolle, G.: A Trust Model Robust to Slander Attacks in Ad Hoc Networks. In: 8th IFIP IEEE International Conference on Mobile and Wireless Communication Networks, MWCN 2006, Santiago (2006)
Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for security in mobile Ad hoc Networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC, Long Beach (2001)
Velloso, P.B., Laufer, R.P., Duarte, O.C., Pujolle, G.: Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity Based Model. IEEE Transactions on Network and Service Management 7(3) (2010)
Li, J., Li, R., Kato, J.: Future trust management framework for mobile Ad hoc networks. IEEE Communications Mag. 46(4), 108–114 (2008)
Abdul-Rahman, Hailes, S.: A distributed trust model. In: Proceedings of 1997 New Security Paradigms Workshop, pp. 48–60. ACM Press (1998)
Zimmermann, P.: The Official PGP User’s Guide. MIT Press (1995)
Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organized public-key management for mobile Ad hoc networks. IEEE Transactions on Mobile Computing 2(1) (2003)
Buchegger, S., Le Boudec, J.V.: Self-Policing Mobile Ad hoc Networks by Reputation Systems. IEEE Communications, 101–107 (2005)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless Ad hoc networks. IEEE Communications (2002)
Song, S., Hwang, K., Zhou, R., Kwong-Kwok, Y.: Trusted P2P Transactions with Fuzzy Reputation Aggregation, 1089-7801. IEEE Computer Society (2005)
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized Ad hoc networks. Technical Report, DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)
Gupta, P., Judge, P., Aniniar, M.H.: A reputation system for peer-to-peer networks. In: Papadopoulos, C., Almeroth, K.C. (eds.) NOSSDAV, pp. 144–152. ACM (2003)
Ismail, S., Josang, A.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce (2002)
Zacharia, G., Maes, P.: Trust management through reputation mechanisms. Applied Artificial Intelligence 14(9), 881–907 (2000)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen-trust algorithm for reputation management in p2p networks (2007)
Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: 6th IFIP Conf. Sec., Slovenia (2002)
Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile Ad hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking, Boston (2000)
Rishiwal, V., Kush, A., Verma, S.: Backbone nodes based Stable routing for mobile Ad hoc network. UBICC Journal 2(3), 34–39 (2007)
Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., Cardei, M.: Reputation and Trust-Based Systems for Ad hoc and Sensor Networks. In: Boukerche, A. (ed.) Algorithms and Protocols for Wireless Ad hoc and Sensor Networks. Wiley & Sons (2007)
AbdulRahman, A., Zuriati, A.Z.: Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks. European Journal of Scientific Research 31(4), 566–576 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beghriche, A., Bilami, A. (2012). RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-30507-8_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30506-1
Online ISBN: 978-3-642-30507-8
eBook Packages: Computer ScienceComputer Science (R0)