Open Access
Subscription Access
Open Access
Subscription Access
Trust Evaluation Model for Mobile Ad Hoc Network
Subscribe/Renew Journal
Securing Mobile ad hoc net work is a challenging task due to the lack of trust among nodes. In this paper we analysis various trust models for Mobile ad hoc network and then propose a trust evaluation model for mobile ad hoc network which estimating trust level of supplicant nodes by Evaluating and analysis node behavior. This model also designed to detect compromised nodes inside the environment and to isolating the compromised and misbehavior nodes from the network. This model also tested through introducing misbehavior nodes and compromised nodes into the environment and the result shows that the model is highly effective in detecting misbehavior node and compromised nodes over various other security models for Mobile ad hoc network.
Keywords
MANET, Trust, Node Misbehavior, Compromised Node
Subscription
Login to verify subscription
User
Font Size
Information
- Jiang T, Baras J (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: 2nd International Workshop on Mobile Distributed Computing. USA: pp 588–593
- Jiang T, Baras J (2004) Cooperative Games, Phase Transition on Graphs and Distributed Trust MANET. In: 43rd IEEE Conference on Decision and Control
- Theodorakopoulos G, Baras J (2004) Trust Evaluation in Ad-Hoc Networks. In: ACM workshop on Wireless security. USA: pp1–10
- Zimmermann PR (1995) The Official PGP User’s Guide. MIT Press USA
- Hubaux JP, Buttyan L, Capkun S (2001) The Quest for Security in Mobile AdHoc Networks. In: 2nd ACM internatio networking & computing. USA: pp 146
- M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, “TSR: Trust MANET Routing using HMMs,” Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks Canada, 27-28 Oct. 2008, pp. 83-90.
- S. Reidt, S. D. Wolthusen, and S. Balfe, “Robust and EfficientCommunication Overlays for Trust Authority Computations,” 2009 IEEE Sarnoff Symposium, March 2009.
- M. A. Ayachi, C. Bidan, T. Abbes, and A. Bouhoula, “MisbehaviorDetection Using Implicit Trust Relations in the AODV Routing Protocol,” Conf. on Computational Science and Engineering 2, 29-31 Aug. 2009, pp. 802-808.
- A. Adnane, C. Bidan, R. T. de Sousa, “ Securing OLSR Protocol,” 2009 Int’l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 28-31 Aug. 2009,pp.745-752.
Abstract Views: 383
PDF Views: 2