Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Trust Evaluation Model for Mobile Ad Hoc Network


     

   Subscribe/Renew Journal


Securing Mobile ad hoc net work is a challenging task due to the lack of trust among nodes. In this paper we analysis various trust models for Mobile ad hoc network and then propose a trust evaluation model for mobile ad hoc network which estimating trust level of supplicant nodes by Evaluating and analysis node behavior. This model also designed to detect compromised nodes inside the environment and to isolating the compromised and misbehavior nodes from the network. This model also tested through introducing misbehavior nodes and compromised nodes into the environment and the result shows that the model is highly effective in detecting misbehavior node and compromised nodes over various other security models for Mobile ad hoc network.

Keywords

MANET, Trust, Node Misbehavior, Compromised Node
Subscription Login to verify subscription
User
Notifications
Font Size


  • Jiang T, Baras J (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: 2nd International Workshop on Mobile Distributed Computing. USA: pp 588–593
  • Jiang T, Baras J (2004) Cooperative Games, Phase Transition on Graphs and Distributed Trust MANET. In: 43rd IEEE Conference on Decision and Control
  • Theodorakopoulos G, Baras J (2004) Trust Evaluation in Ad-Hoc Networks. In: ACM workshop on Wireless security. USA: pp1–10
  • Zimmermann PR (1995) The Official PGP User’s Guide. MIT Press USA
  • Hubaux JP, Buttyan L, Capkun S (2001) The Quest for Security in Mobile AdHoc Networks. In: 2nd ACM internatio networking & computing. USA: pp 146
  • M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, “TSR: Trust MANET Routing using HMMs,” Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks Canada, 27-28 Oct. 2008, pp. 83-90.
  • S. Reidt, S. D. Wolthusen, and S. Balfe, “Robust and EfficientCommunication Overlays for Trust Authority Computations,” 2009 IEEE Sarnoff Symposium, March 2009.
  • M. A. Ayachi, C. Bidan, T. Abbes, and A. Bouhoula, “MisbehaviorDetection Using Implicit Trust Relations in the AODV Routing Protocol,” Conf. on Computational Science and Engineering 2, 29-31 Aug. 2009, pp. 802-808.
  • A. Adnane, C. Bidan, R. T. de Sousa, “ Securing OLSR Protocol,” 2009 Int’l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 28-31 Aug. 2009,pp.745-752.

Abstract Views: 366

PDF Views: 2




  • Trust Evaluation Model for Mobile Ad Hoc Network

Abstract Views: 366  |  PDF Views: 2

Authors

Abstract


Securing Mobile ad hoc net work is a challenging task due to the lack of trust among nodes. In this paper we analysis various trust models for Mobile ad hoc network and then propose a trust evaluation model for mobile ad hoc network which estimating trust level of supplicant nodes by Evaluating and analysis node behavior. This model also designed to detect compromised nodes inside the environment and to isolating the compromised and misbehavior nodes from the network. This model also tested through introducing misbehavior nodes and compromised nodes into the environment and the result shows that the model is highly effective in detecting misbehavior node and compromised nodes over various other security models for Mobile ad hoc network.

Keywords


MANET, Trust, Node Misbehavior, Compromised Node

References