WHAT CAN CONTEXT DO FOR TRUST IN MANETS?

Eymen Ben Bnina, Olivier Camp, Chùng Tiê´n Nguyên, Hella Kaffel Ben Ayed

2008

Abstract

The global performance of a mobile ad hoc networks (manet) greatly depends on, both, the cooperation of participating nodes and the environment in which the nodes evolve. The willingness of a node to cooperate can be illustrated by the trust assessed to the node. Yet, existing trust models, designed for reliable wired networks, do not take into consideration possible communication failures between client and server. We believe, that in the case of ad hoc networks such factors should be considered when computing trust. In this article, we show how an interaction can be decomoposed in three separate phases : two communication phases for transporting the request to the server and the response back to the client, and one execution phase which represents the actual execution of the service by the server. We propose to define the communication environment using contextual attributes and to consider this context when assessing trust to a server. We discuss the possible uses of context in the field of trust computation in manets and define contextual attributes that seem important to consider when modelling and computing trust.

References

  1. Abdul-Rahman, A. and Hailes, S. (2000). Supporting trust in virtual communities. In HICSS 7800: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6, page 6007, Washington, DC, USA. IEEE Computer Society.
  2. Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., and Steggles, P. (1999). Towards a better understanding of context and context-awareness. In HUC 7899: Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, pages 304- 307, London, UK. Springer-Verlag.
  3. Boleng, J., Navidi, W., and Camp, T. (June 2002.). Metrics to enable adaptive protocols for mobile ad hoc networks. In in Proceedings of the International Conference on Wireless Networks (ICWN 7802), Las Vegas, Nev, USA,, pages 293-298.
  4. Castelfranchi, C. and Falcone, R. (1998). Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In Proceeding of the International Conference on Multi-Agent Systems(ICMAS'98).
  5. Duma, C., Shahmehri, N., and Caronni., G. (August 2005.). Dynamic trust metrics for peer-to-peer systems. In In Proc. of 2nd IEEE Workshop on P2P Data Management, Security and Trust.
  6. Gambetta, D. (1988). Can We Trust Trust? Basil Blackwell.
  7. Ghassemian, M., Friderikos, V., and Aghvami, A. H. (September 2005). On mobility metrics applied for ad hoc network protocol evaluation. In The 7th IFIP International Conference on Mobile and Wireless Communications Networks (MWCN), Marrakech, Morocco.
  8. Grandison, T. W. (2003). Trust management for internet applications. PhD thesis, Departement of computing, University of London.
  9. Hekmat, R. and Mieghem, P. V. (October 2003). Degree ditribution and hopcount in wireless ad hoc networks. In Proceedings of the 11th IEEE International Conference on Networks (ICON 2003), pages 603-609, Sydney, Australia.
  10. Marsh, S. P. (1994). Formalising Trust as a Computational Concept. PhD thesis, University of Stirling.
  11. McKnight, D. H. and Chervany., N. L. (1996). The meanings of trust. Technical report, Carlson School of Management,University of Minnesota,United States.
  12. Nguyen, C. T. and Camp, O. (2007). A bayesian network based trust model for improving collaboration in mobile ad hoc networks. International IEEE Conference on Computer Sciences - RIVF(07).
  13. Salber, D., Dey, A. K., and Abowd, G. D. (1999). The context toolkit: aiding the development of contextenabled applications. In CHI 7899: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 434-441, New York, NY, USA. ACM Press.
  14. Schilit, B., Adams, N., and Want, R. (December 1994). Context-aware computing applications. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications.
  15. Toivonen, S., Lenzini, G., and Uusitalo, I. (2006). Contextaware trust evaluation functions for dynamic reconfigurable systems. In Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), Edinburgh, Scotland, UK.
  16. Yu, B. and Singh, M. P. (2001). Towards a probabilistic model of distributed reputation management. In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada, pp. 125-137.
Download


Paper Citation


in Harvard Style

Ben Bnina E., Camp O., Tiê´n Nguyên C. and Kaffel Ben Ayed H. (2008). WHAT CAN CONTEXT DO FOR TRUST IN MANETS? . In Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-989-8111-39-5, pages 133-141. DOI: 10.5220/0001701001330141


in Bibtex Style

@conference{iceis08,
author={Eymen Ben Bnina and Olivier Camp and Chùng Tiê´n Nguyên and Hella Kaffel Ben Ayed},
title={WHAT CAN CONTEXT DO FOR TRUST IN MANETS?},
booktitle={Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2008},
pages={133-141},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001701001330141},
isbn={978-989-8111-39-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - WHAT CAN CONTEXT DO FOR TRUST IN MANETS?
SN - 978-989-8111-39-5
AU - Ben Bnina E.
AU - Camp O.
AU - Tiê´n Nguyên C.
AU - Kaffel Ben Ayed H.
PY - 2008
SP - 133
EP - 141
DO - 10.5220/0001701001330141