ABSTRACT
In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc environment. We propose a trust establishment scheme for MANETs which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of potentially malicious nodes. Each node forms an "opinion" about each of the other nodes based on both first and second-hand observation data collected from the network. The opinion metric can be incorporated into ad hoc routing protocols to achieve reliable packet delivery even when a portion of the network exhibits malicious behavior. We present numerical results which demonstrate the effectiveness of the proposed trust establishment scheme.
- D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Symp. on Network and Distributed Systems Security (NDSS), 2002.Google Scholar
- J. Baras and T. Jiang. Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANET. In Proceedings of the 43rd IEEE Conference on Decision and Control, June 2004.Google Scholar
- D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, Englewood Cliffs, New Jersey, 2 edition, 1992. Google ScholarDigital Library
- S. Buchegger and J.-Y. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proc. 2nd Workshop on Economics of Peer-to-Peer Systems, June 2004.Google Scholar
- L. Buttyan and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mobile Networks and Applications, 8(5):579--592, 2003. Google ScholarDigital Library
- L. Capra. Engineering Human Trust in Mobile System Collaborations. In Proc. 12th ACM SIGSOFT Int. Symp. Foundation of Software Eng., pages 107--116, 2004. Google ScholarDigital Library
- L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. In Proc. Security Protocols Workshop, volume 2845, page 47--66. LNCS, April 2002.Google Scholar
- M. Guerrero. Secure AODV. ACM Mobile Computing and Communications Review, 6(3), August 2002.Google Scholar
- Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. ACM MobiCom '02. ACM SIGMOBILE, September 2002. Google ScholarDigital Library
- T. Jiang and J. S. Baras. Ant-based Adaptive Trust Evidence Distribution in MANET. In Proc. 2nd Int. Workshop on Mobile Distributed Computing, March 2004.Google ScholarCross Ref
- T. Jiang and J. S. Baras. Autonomous Trust Establishment. In Proc. 2nd Int. Network Optimization Conf., 2005.Google Scholar
- D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.Google ScholarCross Ref
- R. K. Nekkanti and C. Lee. Trust based adaptive on demand ad hoc routing protocol. In Proc. 42nd ACM Southeast Regional Conference, pages 88--93, 2004. Google ScholarDigital Library
- P. Papadimitratos and Z. J. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks Journal, 1(1), Jan/Feb/March 2003.Google Scholar
- A. Papoulis. Probability, Random Variables, and Stochastic Processes. McGraw-Hill, New York, 1991.Google Scholar
- C. Perkins, E. Belding-Royer, and S. Das. Ad-hoc On-demand Distance Vector (AODV) Routing. IETF RFC 3561, July 2003. Google ScholarDigital Library
- A. A. Pirzada and C. McDonald. Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Computer Science Conference (ACSC'04), pages 47--54, January 2004. Google ScholarDigital Library
- G. Theodorakopoulos and J. S. Baras. Trust Evaluation in Ad-hoc Networks. In Proceedings of the 2004 ACM workshop on Wireless Security (WiSe '04), pages 1--10, 2004. Google ScholarDigital Library
- M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying Trust in Mobile Ad-Hoc Networks. In Proc. Int. Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005.Google ScholarCross Ref
- L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Networks Special Issue on Network Security, November 1999. Google ScholarDigital Library
Index Terms
- A quantitative trust establishment framework for reliable data packet delivery in MANETs
Recommendations
Robust cooperative trust establishment for MANETs
SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networksIn a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks,secure and reliable packet delivery is diffocult ...
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Special Issue on Security of Ad-hoc and Sensor NetworksIn mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc environment. ...
Comments