skip to main content
10.1145/1102219.1102222acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A quantitative trust establishment framework for reliable data packet delivery in MANETs

Published:07 November 2005Publication History

ABSTRACT

In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc environment. We propose a trust establishment scheme for MANETs which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of potentially malicious nodes. Each node forms an "opinion" about each of the other nodes based on both first and second-hand observation data collected from the network. The opinion metric can be incorporated into ad hoc routing protocols to achieve reliable packet delivery even when a portion of the network exhibits malicious behavior. We present numerical results which demonstrate the effectiveness of the proposed trust establishment scheme.

References

  1. D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Symp. on Network and Distributed Systems Security (NDSS), 2002.Google ScholarGoogle Scholar
  2. J. Baras and T. Jiang. Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANET. In Proceedings of the 43rd IEEE Conference on Decision and Control, June 2004.Google ScholarGoogle Scholar
  3. D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, Englewood Cliffs, New Jersey, 2 edition, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Buchegger and J.-Y. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proc. 2nd Workshop on Economics of Peer-to-Peer Systems, June 2004.Google ScholarGoogle Scholar
  5. L. Buttyan and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mobile Networks and Applications, 8(5):579--592, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Capra. Engineering Human Trust in Mobile System Collaborations. In Proc. 12th ACM SIGSOFT Int. Symp. Foundation of Software Eng., pages 107--116, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. In Proc. Security Protocols Workshop, volume 2845, page 47--66. LNCS, April 2002.Google ScholarGoogle Scholar
  8. M. Guerrero. Secure AODV. ACM Mobile Computing and Communications Review, 6(3), August 2002.Google ScholarGoogle Scholar
  9. Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. ACM MobiCom '02. ACM SIGMOBILE, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Jiang and J. S. Baras. Ant-based Adaptive Trust Evidence Distribution in MANET. In Proc. 2nd Int. Workshop on Mobile Distributed Computing, March 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. T. Jiang and J. S. Baras. Autonomous Trust Establishment. In Proc. 2nd Int. Network Optimization Conf., 2005.Google ScholarGoogle Scholar
  12. D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. K. Nekkanti and C. Lee. Trust based adaptive on demand ad hoc routing protocol. In Proc. 42nd ACM Southeast Regional Conference, pages 88--93, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Papadimitratos and Z. J. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks Journal, 1(1), Jan/Feb/March 2003.Google ScholarGoogle Scholar
  15. A. Papoulis. Probability, Random Variables, and Stochastic Processes. McGraw-Hill, New York, 1991.Google ScholarGoogle Scholar
  16. C. Perkins, E. Belding-Royer, and S. Das. Ad-hoc On-demand Distance Vector (AODV) Routing. IETF RFC 3561, July 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. A. Pirzada and C. McDonald. Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Computer Science Conference (ACSC'04), pages 47--54, January 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Theodorakopoulos and J. S. Baras. Trust Evaluation in Ad-hoc Networks. In Proceedings of the 2004 ACM workshop on Wireless Security (WiSe '04), pages 1--10, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying Trust in Mobile Ad-Hoc Networks. In Proc. Int. Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005.Google ScholarGoogle ScholarCross RefCross Ref
  20. L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Networks Special Issue on Network Security, November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A quantitative trust establishment framework for reliable data packet delivery in MANETs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
      November 2005
      136 pages
      ISBN:1595932275
      DOI:10.1145/1102219

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 November 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader