DocumentCode :
589722
Title :
Reputation based trust management system for MANET
Author :
Banerjee, Adrish ; Neogy, Sarmistha ; Chowdhury, Chandreyee
Author_Institution :
Sch. of Mobile Comput. & Commun., Jadavpur Univ., Kolkata, India
fYear :
2012
fDate :
Nov. 30 2012-Dec. 1 2012
Firstpage :
376
Lastpage :
381
Abstract :
Trust can be interpreted as a subjective belief resulting from past interactions that predicts the future behavior of the trustee. Trust management in distributed and resource-constraint networks, such as mobile ad hoc networks (MANETs) is much more difficult but more crucial than in traditional hierarchical architectures, such as the base station- or access point-centered wireless LANs. Generally, MANET is characterized by decentralized control. Hence no Trusted Third Parties can be used. The trust information or evidence used to evaluate trustworthiness is only provided by peers, i.e. other nodes that form the network. Due to the dynamically changing topology and limited resources (power, bandwidth, computation etc.) the trust evaluation procedure should only rely on local information. In this paper, we propose a reputation-based trust management system for detecting and preventing MANET vulnerabilities. Both active (malicious nodes) and passive (selfish nodes) attacks are investigated and our scheme cooperatively helps the nodes to exclude them from the network while tolerating transient faults. The scheme can work with any on-demand routing protocol. We evaluated the performance of our scheme in a discrete event-simulation environment. The results indicate scalability and robustness of our proposed scheme.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication network management; telecommunication network topology; telecommunication security; MANET; access point-centered wireless LAN; active attacks; base station; decentralized control; discrete event-simulation environment; distributed networks; dynamically changing topology; hierarchical architectures; local information; malicious nodes; mobile ad hoc networks; on-demand routing protocol; passive attacks; reputation based trust management system; resource-constraint networks; selfish nodes; transient faults; trust evaluation procedure; trust information; trusted third parties; Cryptography; Mobile ad hoc networks; Object oriented modeling; Peer to peer computing; Routing; Throughput; Vectors; Mobile Ad hoc network; Reputation; Security; Trust Vector;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-1828-0
Type :
conf
DOI :
10.1109/EAIT.2012.6407975
Filename :
6407975
Link To Document :
بازگشت