• DocumentCode
    742969
  • Title

    A trust management scheme based on behavior feedback for opportunistic networks

  • Author

    Chen Xi ; Sun Liang ; Ma Jianfeng ; Ma Zhuo

  • Author_Institution
    Dept. of Post-Doctoral Res. Center, China Merchants Bank, Shenzhen, China
  • Volume
    12
  • Issue
    4
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    117
  • Lastpage
    129
  • Abstract
    In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering most of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of “Identity Trust” relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the “Behavior Trust” relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the delivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
  • Keywords
    mobile ad hoc networks; telecommunication network management; telecommunication security; trusted computing; MANET; behavior feedback; behavior trust relationship; delivery probability; forwarding operations; harsh environment; identity authentications; identity trust relationship; mobile ad-hoc networks; mobile nodes; mutual authentications; network routing; node density; novel trust management scheme; opportunistic networks; self-organized identity authentications; trust management scheme; trust nodes; trust reconstruction ratio; verified feedback packets; Authentication; Context; Cryptography; Mobile nodes; Routing protocols; forwarding protocols; key management; opportunistic networks; trust management; verified feedback packet;
  • fLanguage
    English
  • Journal_Title
    Communications, China
  • Publisher
    ieee
  • ISSN
    1673-5447
  • Type

    jour

  • DOI
    10.1109/CC.2015.7114058
  • Filename
    7114058