skip to main content
10.1145/1023646.1023648acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Trust evaluation in ad-hoc networks

Published: 01 October 2004 Publication History

Abstract

An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of trust evidence in Ad Hoc Networks. Because of the dynamic nature of Ad Hoc Networks, trust evidence may be uncertain and incomplete. Also, no pre-established infrastructure can be assumed. The process is formulated as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. Using the theory of semirings, we show how two nodes can establish an indirect trust relation without previous direct interaction. The results are robust in the presence of attackers. We give intuitive requirements for any trust evaluation algorithm. The performance of the scheme is evaluated on three topologies.

References

[1]
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust management system. RFC 2704, Sept. 1999.]]
[2]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164--173, 1996.]]
[3]
S. Buchegger and J. Y. Le Boudec. The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France, March 2003.]]
[4]
S. Čapkun, J.-P. Hubaux, and L. Buttyán. Mobility helps security in ad hoc networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), Annapolis, MD, June 2003.]]
[5]
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285--322, 2001.]]
[6]
S. Corson and J. Macker. Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations. RFC 2501, IETF, January 1999.]]
[7]
E. W. Dijkstra. A note on two problems in connection with graphs. Numerische Mathematik, 1:269--271, 1959.]]
[8]
J. R. Douceur. The sybil attack. In Proceedings of the IPTPS02 Workshop, Cambridge, MA, March 2002.]]
[9]
J. Eisner. Parameter estimation for probabilistic finite-state transducers. In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, Philadelphia, July 2002.]]
[10]
P. Erdös and A. Rényi. On random graphs. Publicationes Mathematicae, 6:290--297, 1959.]]
[11]
L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, 10th International Security Protocols Workshop, Cambridge, UK, April 2002, volume 2845 of Lecture Notes in Computer Science, pages 47--66. Springer-Verlag, 2004.]]
[12]
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2--14, Berkeley, CA, May 2000.]]
[13]
J.-P. Hubaux, L. Buttyán, and S. Čapkun. The quest for security in mobile ad hoc networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), 2001.]]
[14]
A. Jøsang. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security (NDSS'99) Symposium, 1999.]]
[15]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in p2p networks. In WWW2003, May 2003.]]
[16]
R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In Proceedings of Public Key Cryptography 2000, volume 1751 of Lecture Notes in Computer Science, pages 93--112. Springer-Verlag, Jan. 2000.]]
[17]
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, pages 229--242, January 1998.]]
[18]
N. Li, B. N. Grosof, and J. Feigenbaum. A practically implementable and tractable delegation logic. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 27--42. IEEE Computer Society Press, May 2000.]]
[19]
S. Marti and H. Garcia-Molina. Limited reputation sharing in p2p systems.]]
[20]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad-hoc networks. In Proceedings of MOBICOM 2000, pages 255--265, 2000.]]
[21]
U. Maurer. Modelling a public-key infrastructure. In E. Bertino, editor, Proc. 1996 European Symposium on Research in Computer Security (ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, pages 325--350. Springer-Verlag, 1996.]]
[22]
M. Mohri. Semiring frameworks and algorithms for shortest-distance problems. J. Autom. Lang. Comb., 7(3):321--350, 2002.]]
[23]
M. K. Reiter and S. G. Stubblebine. Resilient authentication using path independence. IEEE Trans. Comput., 47(12):1351--1362, December 1998.]]
[24]
M. K. Reiter and S. G. Stubblebine. Authentication metric analysis and design. ACM Trans. Inf. Syst. Secur., 2(2):138--158, May 1999.]]
[25]
G. Rote. Path problems in graphs. Computing Supplementum, 7:155--189, 1990.]]
[26]
D. Watts and S. Strogatz. Collective dynamics of "smallworld" networks. Nature, 393, 1998.]]
[27]
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, January 2000.]]
[28]
P. R. Zimmermann. The Official PGP User's Guide. MIT Press, 1995.]]

Cited By

View all
  • (2023)Quality and Quantity Pair as Trust MetricIEICE Transactions on Information and Systems10.1587/transinf.2022EDP7005E106.D:2(181-194)Online publication date: 1-Feb-2023
  • (2023)Mutual Trust Evaluation Model in Quantum Distributed Communication NetworkInternational Journal of Theoretical Physics10.1007/s10773-023-05347-362:4Online publication date: 22-Apr-2023
  • (2022)TDM: Trustworthy Decision-Making Via Interpretability EnhancementIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2021.30842906:3(450-461)Online publication date: Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
October 2004
104 pages
ISBN:158113925X
DOI:10.1145/1023646
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad-hoc networks
  2. semirings
  3. trust evaluation
  4. trust metric

Qualifiers

  • Article

Conference

WiSE04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Quality and Quantity Pair as Trust MetricIEICE Transactions on Information and Systems10.1587/transinf.2022EDP7005E106.D:2(181-194)Online publication date: 1-Feb-2023
  • (2023)Mutual Trust Evaluation Model in Quantum Distributed Communication NetworkInternational Journal of Theoretical Physics10.1007/s10773-023-05347-362:4Online publication date: 22-Apr-2023
  • (2022)TDM: Trustworthy Decision-Making Via Interpretability EnhancementIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2021.30842906:3(450-461)Online publication date: Jun-2022
  • (2022)Estimation of Trust in Clustered Mobile Ad hoc Networks2022 International Conference on Electronics and Renewable Systems (ICEARS)10.1109/ICEARS53579.2022.9752313(724-728)Online publication date: 16-Mar-2022
  • (2020)Mitigating Iot Attacks In Smart Medical Networks Using Enhanced Dirichlet Based Algorithm For Trust Management System2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)10.1109/CONECCT50063.2020.9198414(1-6)Online publication date: Jul-2020
  • (2020)A Model Specification Implementation for Trust NegotiationNetwork and System Security10.1007/978-3-030-65745-1_19(327-341)Online publication date: 19-Dec-2020
  • (2019)Location Aware Clustering and Epidemic Trust Management in Mobile Ad Hoc Network2019 28th International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2019.8847166(1-7)Online publication date: Jul-2019
  • (2019)Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2019.00064(337-340)Online publication date: Oct-2019
  • (2019)A model specification for the design of trust negotiationsComputers and Security10.1016/j.cose.2019.03.02484:C(288-300)Online publication date: 1-Jul-2019
  • (2019)A Survey of Trusted Network Trust Evaluation MethodsSecurity and Privacy in New Computing Environments10.1007/978-3-030-21373-2_8(87-95)Online publication date: 8-Jun-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media