ABSTRACT
Robust trust and reputation evaluation services are significant to ensure the security of mobile ad hoc networks, as centralized administration is not easy to be applied and these networks do not have fixed infrastructures. However, malicious behaviors obviously can make wireless and mobile networks at risk so malicious nodes should be detected and excluded. In this paper, we study the issue of how to evaluate efficiently a node's reputation in a distributed approach. First, a set of management mechanisms is presented to prevent effectively malicious nodes from entering the trusted community. Then we formulate a comprehensive computational reputation model. Through a set of extensive simulation experiments based on the ns-2 simulator, our simulation results demonstrate that our system indeed are more sensitive to suspicious behaviors and peers, and thereby improper behaviors within a community are prevented effectively. Therefore, in dynamic but agile environments, our computational reputation system exhibits high adaptation and low complexity, so that it leads to secure communication among mobile nodes.
- Barber, K. S., Ahn, J., Budalakoti, S., DeAngelis, D., Fullam, K. K., Jones, C. L. D., and Sui, X. "Agent trust evaluation and team formation in heterogeneous organizations", Proceedings of International Conference on Autonomous agents and multi-agent systems, 2007, pp. 1361--1362. Google ScholarDigital Library
- Boukerche, A., El-Khatib, K., Xu, L., and Korba, L. "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, 2006, pp. 1094--1109. Google ScholarDigital Library
- Boukerche, A., and Ren, Y. "ARMA: An Efficient Secure Ad Hoc Routing Protocol", Proceedings of Annual IEEE Global Telecommunications Conference, 2007, pp. 1268--1272.Google ScholarCross Ref
- Brahim, G. B., Ala, A.-f., Kountanis, D., and Khan, B. "A new fuzzy-based cooperative movement model in support of QoS in wireless ad-hoc network", Proceedings of International Conference on wireless communications and mobile computing, 2007, pp. 158--163. Google ScholarDigital Library
- Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., and Jetcheva, J. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols", Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking, 1998, pp. 85--97. Google ScholarDigital Library
- Carruthers, R., and Nikolaidis, I. "Certain limitations of reputation-based schemes in mobile environments", Proceedings of the 8th ACM international symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2005, pp. 2--11. Google ScholarDigital Library
- Dewan, P., and Dasgupta, P. "Trusting routers and relays in ad hoc networks", Proceedings of International Conference on Parallel Processing Workshops, 2003, pp. 351--358.Google ScholarCross Ref
- Ganeriwal, S., and Srivastava, M. B. "Reputation-based framework for high integrity sensor networks", Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004, pp. 66--77. Google ScholarDigital Library
- Grajek, S., Lynch, P., and Cagnetta, L. "Why to market IT services and how to do it", Proceedings of 30th annual ACM SIGUCCS Conference on User services, 2002, pp. 251--253. Google ScholarDigital Library
- Haghpanah, N., Akhoondi, M., Kargar, M., and Movaghar, A. "Trusted secure routing for ad hoc networks", Proceedings of International workshop on mobility management and wireless access, 2007, pp. 176--179. Google ScholarDigital Library
- Ileri, O., Mau S.-C., and Mandayam, N. B. "Pricing for enabling forwarding in self-configuring ad hoc networks", IEEE Journal on Selected Areas in Communications, Vol. 23, 2005, pp. 151--162. Google ScholarDigital Library
- Jaramillo, J. J., and Srikant, R. "DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks", Proceedings of 13th annual ACM International Conference on Mobile computing and networking, 2007, pp. 87--98. Google ScholarDigital Library
- Kane, K., and Browne, J. C. "Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks", Proceedings of the 5th ACM workshop on wireless security, 2006, pp. 105--113. Google ScholarDigital Library
- Klusch, M. "Information agent technology for the Internet: A survey", Data and Knowledge Engineering, Vol. 36, 2001, pp. 337--372. Google ScholarDigital Library
- Liu, H., and Krishnamachari, B. "A price-based reliable routing game in wireless networks", Proceedings of the ACM workshop on Game theory for communications and networks, Italy, 2006. Google ScholarDigital Library
- Liu, J., Sacchetti, D., Sailhan, F., and Issarny, V. "Group management for mobile Ad Hoc networks: design, implementation and experiment", Proceedings of the 6th conference on Mobile Data Management, 2005, pp. 47--54. Google ScholarDigital Library
- Milan, F., Jaramillo, J. J., and Srikant, R. "Achieving cooperation in multihop wireless networks of selfish nodes", Proceeding of workshop on game theory for communications and networks, Pisa, Italy, 2006. Google ScholarDigital Library
- Mitra, A., Udupa, R., and Maheswaran, M. "A secured hierarchical trust management framework for public computing utilities", Proceedings of the conference of the Centre for Advanced Studies on Collaborative research, 2005, pp. 185--199. Google ScholarDigital Library
- NS-2, Information Sciences Institute, University of Southern California, available at http://www.isi.edu/nsnam/ns/.Google Scholar
- Perkins, C. E., and Royer, M. E. "Ad hoc on demand distance vector (AODV) routing", IETF Internet Draft, www.ietf.org, 1997. Google ScholarDigital Library
- Ren, Y., and Boukerche, A. "Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks", Proceedings of IEEE International Conference on Communications (ICC), 2008, pp. 2129--2133.Google ScholarCross Ref
- Santi, P., Eidenbenz, S., and Resta, G. "A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks", Proceedings of the workshop on dependability issues in wireless ad hoc networks and sensor networks, 2006, pp. 9--18. Google ScholarDigital Library
- Schneider, J., Kortuem, G., Jager, J., Fickas, S., and Segall, Z. "Disseminating Trust Information in Wearable Communities", Personal and Ubiquitous Computing, Vol. 4, 2000, pp. 245--248. Google ScholarDigital Library
- Selcuk, A. A., Uzun, E., and Pariente, M. R. "A reputation-based trust management system for P2P networks", Proceedings of International Symposium on Cluster Computing and the Grid, 2004, pp. 251--258. Google ScholarDigital Library
- Singh, A., and Liu, L. "TrustMe: anonymous management of trust relationships in decentralized P2P systems", Proceedings of International Conference on Peer-to-Peer Computing, 2003, pp. 142--149. Google ScholarDigital Library
- Wikipedia contributors, "Mobile ad-hoc network", Wikipedia, The Free Encyclopedia, 2008.Google Scholar
- Wood, A. D., Fang, L., Stankovic, J. A., and He, T. "SIGF: a family of configurable, secure routing protocols for wireless sensor networks", Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 35--48. Google ScholarDigital Library
- Zhong, S., Chen, J., and Yang, Y. R. "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks", Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, 2003, pp. 1987--1997.Google ScholarCross Ref
Index Terms
- A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
Recommendations
A weight-based clustering multicast routing protocol for mobile ad hoc networks
In mobile ad hoc networks, the mobile nodes can move arbitrarily without any centralised management mechanism. The topology of these networks can be very dynamic due to the mobility of mobile nodes. Under such changeable network topology, multicasting ...
Performance evaluation of routing protocols for ad hoc wireless networks
A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play an increasingly important role in future civilian and military settings, being useful for ...
Self-organized network-layer security in mobile ad hoc networks
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securityProtecting the network layer in a mobile ad hoc network is an important research topic in wireless security. This paper describes our unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding ...
Comments