Trust: An Approach for Securing Mobile ad hoc Network

Chung Tien NGUYEN, Olivier CAMP

Abstract

When functionning in the ad hoc mode, wireless networks do not rely on a predefined infrastructure for achieving the basic network functionalities. Hosts of such networks need to count on one another to keep in contact with the network and carry out services such as routing, security, auto-configuration,... Network services and, in particular, security thus strongly depend on the way the nodes find the correct partners with which they can cooperate efficiently. As consequence, it seems important for ad hoc networks to provide a representation of trust together with a mechanism to evaluate it. In this paper, we present ad hoc networks, and show how trust is fundamental in the existing propositions to improve their security. After identifying the characteristics of existing trust models, we focus on those that should be implemented in a trust model for ad hoc networks.

References

  1. Meissner, A., Musunoori, S.B.: Group integrity management support for mobile ad-hoc communities. In: Middleware Workshops. (2003) 53-59
  2. Shen, C.C., Jaikaeo, C., Srisathapornphat, C., Huang, Z.: The guerrilla management architecture for ad hoc networks. Proceedings of IEEE MILCOM, Anaheim, California, USA (2002)
  3. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking. (2000) 275-283
  4. Percher, J.M.: An Intrusion Detection Model for Wireless Ad Hoc Networks (in French). PhD thesis, Universit de Versailles (2004)
  5. Nekkanti, R.K., wei Lee, C.: Trust based adaptive on demand ad hoc routing protocol. In: Proceedings of the 42nd annual Southeast regional conference. (2004)
  6. Dewan, P., Dasgupta, P.: Trusting routers and relays in ad hoc networks. 2003 International Conference on Parallel Processing Workshops (2003) 351
  7. Prax, J.Y.: The role of trust in collective performance. In: Manual of Knowledge Management - A Second Generation Approach. (2003)
  8. Gambetta, D.: Can We Trust Trust? In: Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford (2000) 213-237
  9. Dasgupta, P.: Trust as a Commodity. In: Trust: Making and Breaking Cooperative Relations. Department of Sociology, University Oxford (2000) 49-72
  10. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Proc. 3rd European Symposium on Research in Computer Security - ESORICS 7894. (1994) 3-18
  11. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7. (2002)
  12. Maurer, U.: Modelling a public-key infrastructure. In: ESORICS: European Symposium on Research in Computer Security, LNCS, Springer-Verlag (1996)
  13. Abdul-Rahman, A.: The pgp trust model. EDI-Forum: the Journal of Electronic Commerce (1997)
  14. Joseph, S.: Neurogrid: Semantically routing queries in peer-to-peer networks. In: Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing, Springer-Verlag (2002) 202-214
  15. Reagle, J.: Trust in a cryptographic economy and digital security deposits:protocols and policies. Master's thesis, University of Maryland Baltimore County (1996)
  16. Jøsang, A.: The right type of trust for distributed systems. In: Proceedings of the 1996 workshop on New security paradigms, ACM Press (1996) 119-131
  17. Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling (1994)
  18. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Spki certificate theory. RFC 2693 (1999)
  19. Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile. RFC 2459 (1999)
  20. OpenPrivacy: (Sierra: An openprivacy reputation management framework) OpenPrivacy projects.
  21. Chen, R., Yeager, W.: Poblano: A distributed trust model for peer-to-peer networks. Sun Microsystems (2001)
Download


Paper Citation


in Harvard Style

Tien NGUYEN C. and CAMP O. (2005). Trust: An Approach for Securing Mobile ad hoc Network . In Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005) ISBN 972-8865-21-X, pages 92-103. DOI: 10.5220/0002574000920103


in Bibtex Style

@conference{wis05,
author={Chung Tien NGUYEN and Olivier CAMP},
title={Trust: An Approach for Securing Mobile ad hoc Network},
booktitle={Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)},
year={2005},
pages={92-103},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002574000920103},
isbn={972-8865-21-X},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)
TI - Trust: An Approach for Securing Mobile ad hoc Network
SN - 972-8865-21-X
AU - Tien NGUYEN C.
AU - CAMP O.
PY - 2005
SP - 92
EP - 103
DO - 10.5220/0002574000920103