skip to main content
10.1145/1102219.1102222acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A quantitative trust establishment framework for reliable data packet delivery in MANETs

Published: 07 November 2005 Publication History

Abstract

In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc environment. We propose a trust establishment scheme for MANETs which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of potentially malicious nodes. Each node forms an "opinion" about each of the other nodes based on both first and second-hand observation data collected from the network. The opinion metric can be incorporated into ad hoc routing protocols to achieve reliable packet delivery even when a portion of the network exhibits malicious behavior. We present numerical results which demonstrate the effectiveness of the proposed trust establishment scheme.

References

[1]
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Symp. on Network and Distributed Systems Security (NDSS), 2002.
[2]
J. Baras and T. Jiang. Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANET. In Proceedings of the 43rd IEEE Conference on Decision and Control, June 2004.
[3]
D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, Englewood Cliffs, New Jersey, 2 edition, 1992.
[4]
S. Buchegger and J.-Y. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proc. 2nd Workshop on Economics of Peer-to-Peer Systems, June 2004.
[5]
L. Buttyan and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mobile Networks and Applications, 8(5):579--592, 2003.
[6]
L. Capra. Engineering Human Trust in Mobile System Collaborations. In Proc. 12th ACM SIGSOFT Int. Symp. Foundation of Software Eng., pages 107--116, 2004.
[7]
L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. In Proc. Security Protocols Workshop, volume 2845, page 47--66. LNCS, April 2002.
[8]
M. Guerrero. Secure AODV. ACM Mobile Computing and Communications Review, 6(3), August 2002.
[9]
Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. ACM MobiCom '02. ACM SIGMOBILE, September 2002.
[10]
T. Jiang and J. S. Baras. Ant-based Adaptive Trust Evidence Distribution in MANET. In Proc. 2nd Int. Workshop on Mobile Distributed Computing, March 2004.
[11]
T. Jiang and J. S. Baras. Autonomous Trust Establishment. In Proc. 2nd Int. Network Optimization Conf., 2005.
[12]
D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.
[13]
R. K. Nekkanti and C. Lee. Trust based adaptive on demand ad hoc routing protocol. In Proc. 42nd ACM Southeast Regional Conference, pages 88--93, 2004.
[14]
P. Papadimitratos and Z. J. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks Journal, 1(1), Jan/Feb/March 2003.
[15]
A. Papoulis. Probability, Random Variables, and Stochastic Processes. McGraw-Hill, New York, 1991.
[16]
C. Perkins, E. Belding-Royer, and S. Das. Ad-hoc On-demand Distance Vector (AODV) Routing. IETF RFC 3561, July 2003.
[17]
A. A. Pirzada and C. McDonald. Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Computer Science Conference (ACSC'04), pages 47--54, January 2004.
[18]
G. Theodorakopoulos and J. S. Baras. Trust Evaluation in Ad-hoc Networks. In Proceedings of the 2004 ACM workshop on Wireless Security (WiSe '04), pages 1--10, 2004.
[19]
M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying Trust in Mobile Ad-Hoc Networks. In Proc. Int. Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005.
[20]
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Networks Special Issue on Network Security, November 1999.

Cited By

View all
  • (2024)A Transactive Energy Architecture for Integration of Energy Communities in Virtual Power Plants2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE)10.1109/ISGTEUROPE62998.2024.10863758(1-5)Online publication date: 14-Oct-2024
  • (2023)Trust assessment in social networksInternational Journal of System Assurance Engineering and Management10.1007/s13198-023-02118-515:5(1650-1666)Online publication date: 3-Oct-2023
  • (2022)A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc NetworksSensors10.3390/s2202057122:2(571)Online publication date: 12-Jan-2022
  • Show More Cited By

Index Terms

  1. A quantitative trust establishment framework for reliable data packet delivery in MANETs

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
    November 2005
    136 pages
    ISBN:1595932275
    DOI:10.1145/1102219
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. mobile ad hoc networks
    2. routing
    3. trust establishment

    Qualifiers

    • Article

    Conference

    CCS05
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Transactive Energy Architecture for Integration of Energy Communities in Virtual Power Plants2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE)10.1109/ISGTEUROPE62998.2024.10863758(1-5)Online publication date: 14-Oct-2024
    • (2023)Trust assessment in social networksInternational Journal of System Assurance Engineering and Management10.1007/s13198-023-02118-515:5(1650-1666)Online publication date: 3-Oct-2023
    • (2022)A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc NetworksSensors10.3390/s2202057122:2(571)Online publication date: 12-Jan-2022
    • (2022)Utilising Acknowledge for the Trust in Wireless Sensor NetworksApplied Sciences10.3390/app1204204512:4(2045)Online publication date: 16-Feb-2022
    • (2022)Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2021.313905224:1(280-305)Online publication date: Sep-2023
    • (2022)Point-Based Trust: Define How Much Privacy Is WorthInformation and Communications Security10.1007/11935308_14(190-209)Online publication date: 10-Mar-2022
    • (2021)Trust Quantification for Autonomous Medical Advisory Systems2021 18th International Conference on Privacy, Security and Trust (PST)10.1109/PST52912.2021.9647818(1-7)Online publication date: 13-Dec-2021
    • (2021)A modified Skellam distribution used in MANET’s based on selfish node detection techniqueMaterials Today: Proceedings10.1016/j.matpr.2020.10.671Online publication date: Jan-2021
    • (2021)An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDTComputer Networks, Big Data and IoT10.1007/978-981-16-0965-7_7(53-69)Online publication date: 22-Jun-2021
    • (2020)A Novel Light-Weight Subjective Trust Inference Framework in MANETsIEEE Transactions on Sustainable Computing10.1109/TSUSC.2018.28172195:2(236-248)Online publication date: 1-Apr-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media