Skip to main content

Modeling Trust in Wireless Ad-Hoc Networks

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking
  • 1336 Accesses

Abstract

A model for computing trust inwirelessad-hoc networks has been proposed. The model is based on the societal approach towards building a trustedcommunity, where trust is builtup slowly, but decreases to zero on asingle detectable misbehavior.Successive trust build-ups depend on past behavior. Wireless channel loss probability has also been considered in the model.Extensive simulation has been conducted to evaluate the model under different conditions.A system level approach for incorporating the model in a real-life ad-hoc network testbed hasalsobeen discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. Alfarez Abdul-Rahman & Stephen Hailes, “A Distributed Trust Model”, ACM New Security Paradigm Workshop, 1997.

    Google Scholar 

  2. Matt Blaze, Joan Feigenbaum, Jack Lacy, “Decentralized Trust Management”, inProc. IEEE Conference on Security and Privacy, Oakland, CA, May 1996.

    Google Scholar 

  3. Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, “Mitigating Routing Misbehavior in MobileAd-hocNetworks”, inProceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, United States, August 06 - 11, 2000.

    Google Scholar 

  4. Zheng Yan, Peng Zhang, Teemupekka Virtanen, “Trust Evaluation Based Security Solution inAd-hocNetworks”, inProc. of NordSec 2003, Norway, 2003.

    Google Scholar 

  5. Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad-hoc Networks”, appeared in 27th Australian Computer Science Conference, The Univ. of Otago, Dunedin, New Zealand, 2004.

    Google Scholar 

  6. J. Li, R. Li, J. Kato, “Future Trust Management Framework for Mobile Ad-hoc Networks”,IEEE Communications Magazine, April 2008.

    Google Scholar 

  7. Y. L. Sun, Z. Han, W. Yu, K.J.R. Liu, “Attacks on Trust Evaluation in Distributed Networks”, in Proc. of the 40th annual conference on Information Science and Systems (CISS), Princeton, NJ, March 2006.

    Google Scholar 

  8. Xiaoqi Li, Michael R. Lyu, Jiangchuan Liu, “A Trust Model Based Routing Protocol for SecureAd-hocNetworks”,Proceedings 2004 IEEE Aerospace Conference,Big Sky, Montana, U.S.A., March 6–13 2004.

    Google Scholar 

  9. A. Josang, “A Logic for Uncertain Probabilities”,International Journal of Uncertainty, Fuzziness and Knowledge-based Systems,vol.9(3):pp.279–311, 2001.

    MathSciNet  Google Scholar 

  10. Sonja Buchegger and Jean-Yves Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks)”, inProceedings of the Third ACM International Symposium on MobileAd-hocNetworking and Computing(MOBIHOC ‘02),Switzerland, June 9–11, 2002.

    Google Scholar 

  11. Pietro Michiardi and Refik Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in MobileAd-hocNetworks”,inProceedings of the 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, 2002.

    Google Scholar 

  12. L. Buttyán and J.P.Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad-hocNetworks”,Mobile Network and Applications (MONET),vol.8(5), pp 579–592, 2003.

    Article  Google Scholar 

  13. T. Ghosh, N. Pissinou, K. Makki, A. Farhat, “A Framework for Computing Trust in MobileAd-hocNetworks”,Mobile and Wireless Network Security and Privacy, by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007.

    Google Scholar 

  14. AODV Implementation, (AODV-UU), Department of Information Technology, Uppsala University (Sweden), http://core.it.uu.se/core/index.php/AODV-UU.

  15. Peter Reiher, et al., “Research Direction in Security and Privacy for Mobile and Wireless Networks”,Technical Report to National Science Foundation, July 2006.

    Google Scholar 

  16. T. Ghosh, B. Pratt, “Routing Table Instability in Real-world Ad-Hoc Network Testbed”,Advances in Computer and Information Science and Engineering, by Sobh, T. (Ed). Springer, ISBN 978-1-4020-8740-0, 2008.

    Google Scholar 

  17. S. Buchegger, C. Tissieres, J.L.Boudec,”A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks–HowMuch Can Watchdogs Really Do?”inProceedings of IEEE WMCSA ‘04, English Lake District,UK, December 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tirthankar Ghosh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Ghosh, T., Xu, H. (2010). Modeling Trust in Wireless Ad-Hoc Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_37

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_37

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics