A framework for computing trust in mobile Ad-Hoc networks Book Chapter

Ghosh, T, Pissinou, N, Makki, K et al. (2007). A framework for computing trust in mobile Ad-Hoc networks . 67-83. 10.1007/978-0-387-71058-7_4

cited authors

  • Ghosh, T; Pissinou, N; Makki, K; Farhat, A

authors

abstract

  • Modeling and computing trusts in ad-hoc networks is a challenging problem. It is very difficult to form a true and honest opinion about the trustworthiness of the nodes in such applications where the network is formed with near-strangers relying on one another for normal network operation without any prior knowledge of trustworthiness. These near-strangers can be engaged in malicious activities in different ways. This intricacy in trust computation, together with frequent topology changes among nodes, quite often causes the whole network to get compromised or disrupted. Different malicious activities of the nodes can very well be misinterpreted as the regular erratic behavior of the wireless networks in general and ad-hoc networks in particular, thus making trust computation even more difficult. In this paper we have proposed a framework for modeling and computing trusts that take into account different malicious behavior of the nodes. Our proposed model tries to explore the behavioral pattern of the attacker in different ways and quantifies those behaviors to form a computing framework. In some of the earlier works on trust computation, incentive mechanisms have been proposed to prevent selfish behavior among the nodes. These mechanisms can be either reputation-based incentive mechanisms (Buchegger and Boudec 2002; Michiardi and Molva 2002), or price-based incentive mechanism (Buttyán and Hubaux 2003). In both the mechanisms, nodes are given incentives to suppress their malicious intention in favor of the network. But nodes with malicious intentions always try to find ways to bypass these incentive mechanisms. In our work, instead of forcing the nodes to act in an unselfish way, we propose to develop a trust model by collaborative effort and use this model in the trusted routing solution proposed by us in our earlier work [Pissinou et al. 2004; Ghosh et al. 2004]. © 2007 Springer Science+Business Media, LLC.

publication date

  • December 1, 2007

Digital Object Identifier (DOI)

International Standard Book Number (ISBN) 13

start page

  • 67

end page

  • 83