skip to main content
10.1145/1454609.1454628acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks

Published:27 October 2008Publication History

ABSTRACT

Robust trust and reputation evaluation services are significant to ensure the security of mobile ad hoc networks, as centralized administration is not easy to be applied and these networks do not have fixed infrastructures. However, malicious behaviors obviously can make wireless and mobile networks at risk so malicious nodes should be detected and excluded. In this paper, we study the issue of how to evaluate efficiently a node's reputation in a distributed approach. First, a set of management mechanisms is presented to prevent effectively malicious nodes from entering the trusted community. Then we formulate a comprehensive computational reputation model. Through a set of extensive simulation experiments based on the ns-2 simulator, our simulation results demonstrate that our system indeed are more sensitive to suspicious behaviors and peers, and thereby improper behaviors within a community are prevented effectively. Therefore, in dynamic but agile environments, our computational reputation system exhibits high adaptation and low complexity, so that it leads to secure communication among mobile nodes.

References

  1. Barber, K. S., Ahn, J., Budalakoti, S., DeAngelis, D., Fullam, K. K., Jones, C. L. D., and Sui, X. "Agent trust evaluation and team formation in heterogeneous organizations", Proceedings of International Conference on Autonomous agents and multi-agent systems, 2007, pp. 1361--1362. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boukerche, A., El-Khatib, K., Xu, L., and Korba, L. "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, 2006, pp. 1094--1109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Boukerche, A., and Ren, Y. "ARMA: An Efficient Secure Ad Hoc Routing Protocol", Proceedings of Annual IEEE Global Telecommunications Conference, 2007, pp. 1268--1272.Google ScholarGoogle ScholarCross RefCross Ref
  4. Brahim, G. B., Ala, A.-f., Kountanis, D., and Khan, B. "A new fuzzy-based cooperative movement model in support of QoS in wireless ad-hoc network", Proceedings of International Conference on wireless communications and mobile computing, 2007, pp. 158--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., and Jetcheva, J. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols", Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking, 1998, pp. 85--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Carruthers, R., and Nikolaidis, I. "Certain limitations of reputation-based schemes in mobile environments", Proceedings of the 8th ACM international symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2005, pp. 2--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dewan, P., and Dasgupta, P. "Trusting routers and relays in ad hoc networks", Proceedings of International Conference on Parallel Processing Workshops, 2003, pp. 351--358.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ganeriwal, S., and Srivastava, M. B. "Reputation-based framework for high integrity sensor networks", Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004, pp. 66--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Grajek, S., Lynch, P., and Cagnetta, L. "Why to market IT services and how to do it", Proceedings of 30th annual ACM SIGUCCS Conference on User services, 2002, pp. 251--253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Haghpanah, N., Akhoondi, M., Kargar, M., and Movaghar, A. "Trusted secure routing for ad hoc networks", Proceedings of International workshop on mobility management and wireless access, 2007, pp. 176--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ileri, O., Mau S.-C., and Mandayam, N. B. "Pricing for enabling forwarding in self-configuring ad hoc networks", IEEE Journal on Selected Areas in Communications, Vol. 23, 2005, pp. 151--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jaramillo, J. J., and Srikant, R. "DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks", Proceedings of 13th annual ACM International Conference on Mobile computing and networking, 2007, pp. 87--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kane, K., and Browne, J. C. "Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks", Proceedings of the 5th ACM workshop on wireless security, 2006, pp. 105--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Klusch, M. "Information agent technology for the Internet: A survey", Data and Knowledge Engineering, Vol. 36, 2001, pp. 337--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Liu, H., and Krishnamachari, B. "A price-based reliable routing game in wireless networks", Proceedings of the ACM workshop on Game theory for communications and networks, Italy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Liu, J., Sacchetti, D., Sailhan, F., and Issarny, V. "Group management for mobile Ad Hoc networks: design, implementation and experiment", Proceedings of the 6th conference on Mobile Data Management, 2005, pp. 47--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Milan, F., Jaramillo, J. J., and Srikant, R. "Achieving cooperation in multihop wireless networks of selfish nodes", Proceeding of workshop on game theory for communications and networks, Pisa, Italy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mitra, A., Udupa, R., and Maheswaran, M. "A secured hierarchical trust management framework for public computing utilities", Proceedings of the conference of the Centre for Advanced Studies on Collaborative research, 2005, pp. 185--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. NS-2, Information Sciences Institute, University of Southern California, available at http://www.isi.edu/nsnam/ns/.Google ScholarGoogle Scholar
  20. Perkins, C. E., and Royer, M. E. "Ad hoc on demand distance vector (AODV) routing", IETF Internet Draft, www.ietf.org, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ren, Y., and Boukerche, A. "Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks", Proceedings of IEEE International Conference on Communications (ICC), 2008, pp. 2129--2133.Google ScholarGoogle ScholarCross RefCross Ref
  22. Santi, P., Eidenbenz, S., and Resta, G. "A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks", Proceedings of the workshop on dependability issues in wireless ad hoc networks and sensor networks, 2006, pp. 9--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Schneider, J., Kortuem, G., Jager, J., Fickas, S., and Segall, Z. "Disseminating Trust Information in Wearable Communities", Personal and Ubiquitous Computing, Vol. 4, 2000, pp. 245--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Selcuk, A. A., Uzun, E., and Pariente, M. R. "A reputation-based trust management system for P2P networks", Proceedings of International Symposium on Cluster Computing and the Grid, 2004, pp. 251--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Singh, A., and Liu, L. "TrustMe: anonymous management of trust relationships in decentralized P2P systems", Proceedings of International Conference on Peer-to-Peer Computing, 2003, pp. 142--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wikipedia contributors, "Mobile ad-hoc network", Wikipedia, The Free Encyclopedia, 2008.Google ScholarGoogle Scholar
  27. Wood, A. D., Fang, L., Stankovic, J. A., and He, T. "SIGF: a family of configurable, secure routing protocols for wireless sensor networks", Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 35--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Zhong, S., Chen, J., and Yang, Y. R. "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks", Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, 2003, pp. 1987--1997.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          PE-WASUN '08: Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
          October 2008
          110 pages
          ISBN:9781605582368
          DOI:10.1145/1454609

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 27 October 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          PE-WASUN '08 Paper Acceptance Rate16of42submissions,38%Overall Acceptance Rate70of240submissions,29%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader