skip to main content
10.1145/1180345.1180349acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Robust cooperative trust establishment for MANETs

Published:30 October 2006Publication History

ABSTRACT

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks,secure and reliable packet delivery is diffocult to achieve. We propose a robust cooperative trust establishment scheme to improve the reliability of packet delivery in MANETs, particularly in the presence of malicious nodes. In the proposed scheme, each node determines the trustworthiness of the other nodes with respect to reliable packet forwarding by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. First-hand trust information for neighbor nodes is obtained via direct observations at the MAC layer whereas first-hand information for non-neighbor nodes is obtained via feedback from acknowledgements sent in response to data packets. The proposed scheme exploits information sharing among nodes to accelerate the convergence of trust establishment procedures, yet is robust against the propagation of false trust information by malicious nodes. We present simulation results which demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving nodes that are malicious both with respect to packet forwarding and trust propagation.

References

  1. L. Eschenauer, V. D. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks," in Proc. Security Protocols Workshop vol. 2845, pp. 47--66, LNCS, April 2002.Google ScholarGoogle Scholar
  2. C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs," in In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'05) pp. 1--10, November 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Networks Special Issue on Network Security November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Papadimitratos and Z. J. Haas, "Secure message transmission in mobile ad hoc networks, "Elsevier Ad Hoc Networks Journal vol. 1, Jan/Feb/March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Jiang and J. S. Baras, "Ant-based Adaptive Trust Evidence Distribution in MANET," in Proceedings of the 2nd International Workshop on Mobile Distributed Computing (MDC)March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Buchegger and J.-Y. L. Boudec, "A Robust Reputation System for P2P and Mobile Ad-hoc Networks," in Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems June 2004.Google ScholarGoogle Scholar
  7. A. A. Pirzada and C. McDonald, "Establishing trust in pure ad-hoc networks,"in Proceedings of the 27th Australasian Computer Science Conference (ACSC04) pp. 47--54,January 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Theodorakopoulos and J. S. Baras, "Trust Evaluation in Ad-hoc Networks," in Proceedings of the 2004 ACM workshop on Wireless Security (WiSe '04) pp. 1--10, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, "Mobile Networks and Applications vol. 8, no. 5, pp. 579--592, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Capra, "Engineering Human Trust in Mobile System Collaborations, "in Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering pp. 107--116, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Jiang and J. S. Baras, "Autonomous Trust Establishment," in Proceedings of the 2nd International Network Optimization Conference 2005.Google ScholarGoogle Scholar
  12. J. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANET," in Proceedings of the 43rd IEEE Conference on Decision and Control June 2004.Google ScholarGoogle Scholar
  13. S. Marsh, Formalizing Trust as a Computational Concept PhD thesis, University of Stirling, 1994.Google ScholarGoogle Scholar
  14. Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the ACM MobiCom '02 ACM SIGMOBILE, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) 2002 January 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing," in Proc. IEEE Infocom '04 March 2004.Google ScholarGoogle Scholar
  17. I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Amendment to: Highly secure and efficient routing." unpublished technical note, February 2004.Google ScholarGoogle Scholar

Index Terms

  1. Robust cooperative trust establishment for MANETs

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
            October 2006
            186 pages
            ISBN:1595935541
            DOI:10.1145/1180345

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader