skip to main content
10.1145/1180345.1180349acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Robust cooperative trust establishment for MANETs

Published: 30 October 2006 Publication History

Abstract

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks,secure and reliable packet delivery is diffocult to achieve. We propose a robust cooperative trust establishment scheme to improve the reliability of packet delivery in MANETs, particularly in the presence of malicious nodes. In the proposed scheme, each node determines the trustworthiness of the other nodes with respect to reliable packet forwarding by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. First-hand trust information for neighbor nodes is obtained via direct observations at the MAC layer whereas first-hand information for non-neighbor nodes is obtained via feedback from acknowledgements sent in response to data packets. The proposed scheme exploits information sharing among nodes to accelerate the convergence of trust establishment procedures, yet is robust against the propagation of false trust information by malicious nodes. We present simulation results which demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving nodes that are malicious both with respect to packet forwarding and trust propagation.

References

[1]
L. Eschenauer, V. D. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks," in Proc. Security Protocols Workshop vol. 2845, pp. 47--66, LNCS, April 2002.
[2]
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs," in In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'05) pp. 1--10, November 2005.
[3]
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Networks Special Issue on Network Security November 1999.
[4]
P. Papadimitratos and Z. J. Haas, "Secure message transmission in mobile ad hoc networks, "Elsevier Ad Hoc Networks Journal vol. 1, Jan/Feb/March 2003.
[5]
T. Jiang and J. S. Baras, "Ant-based Adaptive Trust Evidence Distribution in MANET," in Proceedings of the 2nd International Workshop on Mobile Distributed Computing (MDC)March 2004.
[6]
S. Buchegger and J.-Y. L. Boudec, "A Robust Reputation System for P2P and Mobile Ad-hoc Networks," in Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems June 2004.
[7]
A. A. Pirzada and C. McDonald, "Establishing trust in pure ad-hoc networks,"in Proceedings of the 27th Australasian Computer Science Conference (ACSC04) pp. 47--54,January 2004.
[8]
G. Theodorakopoulos and J. S. Baras, "Trust Evaluation in Ad-hoc Networks," in Proceedings of the 2004 ACM workshop on Wireless Security (WiSe '04) pp. 1--10, 2004.
[9]
L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, "Mobile Networks and Applications vol. 8, no. 5, pp. 579--592, 2003.
[10]
L. Capra, "Engineering Human Trust in Mobile System Collaborations, "in Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering pp. 107--116, 2004.
[11]
T. Jiang and J. S. Baras, "Autonomous Trust Establishment," in Proceedings of the 2nd International Network Optimization Conference 2005.
[12]
J. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANET," in Proceedings of the 43rd IEEE Conference on Decision and Control June 2004.
[13]
S. Marsh, Formalizing Trust as a Computational Concept PhD thesis, University of Stirling, 1994.
[14]
Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the ACM MobiCom '02 ACM SIGMOBILE, September 2002.
[15]
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) 2002 January 2002.
[16]
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing," in Proc. IEEE Infocom '04 March 2004.
[17]
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Amendment to: Highly secure and efficient routing." unpublished technical note, February 2004.

Cited By

View all
  • (2024)Human Trust in Robots: A Survey on Trust Models and Their Controls/Robotics ApplicationsIEEE Open Journal of Control Systems10.1109/OJCSYS.2023.33450903(58-86)Online publication date: 2024
  • (2022)A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc NetworksSensors10.3390/s2202057122:2(571)Online publication date: 12-Jan-2022
  • (2020)Malicious vehicle node detection mechanism based on repeated game and trust evaluation in VANETJournal of Physics: Conference Series10.1088/1742-6596/1634/1/0121221634(012122)Online publication date: 14-Oct-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
October 2006
186 pages
ISBN:1595935541
DOI:10.1145/1180345
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile ad hoc networks
  2. routing
  3. trust establishment

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Human Trust in Robots: A Survey on Trust Models and Their Controls/Robotics ApplicationsIEEE Open Journal of Control Systems10.1109/OJCSYS.2023.33450903(58-86)Online publication date: 2024
  • (2022)A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc NetworksSensors10.3390/s2202057122:2(571)Online publication date: 12-Jan-2022
  • (2020)Malicious vehicle node detection mechanism based on repeated game and trust evaluation in VANETJournal of Physics: Conference Series10.1088/1742-6596/1634/1/0121221634(012122)Online publication date: 14-Oct-2020
  • (2020)On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc NetworksCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_5(87-104)Online publication date: 27-May-2020
  • (2019)A Layered Secure Communication Model for Cooperative Vehicle Infrastructure SystemAdvances in Intelligent, Interactive Systems and Applications10.1007/978-3-030-02804-6_106(815-822)Online publication date: 17-Jan-2019
  • (2018)Trust Model Based Uncertainty Analysis Between Multi-path Routes in MANET Using Subjective LogicWireless Sensor Networks10.1007/978-981-10-8123-1_28(319-332)Online publication date: 24-Feb-2018
  • (2017)An enhanced Bayesian-based reputation system for P2P file sharing2017 Computing Conference10.1109/SAI.2017.8252250(1247-1252)Online publication date: Jul-2017
  • (2017)Trust management in mobile ad hoc network: A survey2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)10.1109/ICECA.2017.8212856(455-460)Online publication date: Apr-2017
  • (2017)Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold StrategyMobile Networks and Applications10.1007/s11036-017-0867-022:3(493-509)Online publication date: 3-May-2017
  • (2015)ReputationProACM Transactions on the Web10.1145/26973909:1(1-49)Online publication date: 23-Jan-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media