scispace - formally typeset
Journal ArticleDOI

Information theoretic framework of trust modeling and evaluation for ad hoc networks

TLDR
Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Abstract
The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on Trust Management for Mobile Ad Hoc Networks

TL;DR: This work seeks to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust"derived from information and communication networks to obtain a composite trust metric.
Proceedings ArticleDOI

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks

TL;DR: This paper proposes a framework for data-centric trust establishment: first, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques.
Journal ArticleDOI

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey

TL;DR: A detailed survey on various trust computing approaches that are geared towards MANETs is presented, including trust propagation, prediction and aggregation algorithms, the influence of network dynamics on trust dynamics and the impact of trust on security services are analyzed.
Journal ArticleDOI

Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks

TL;DR: A new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering and reduces the cost of trust evaluation and is more suitable for large-scale sensor networks.
Journal ArticleDOI

Trust management in wireless sensor networks

TL;DR: The goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities, and to explore the interplay among the implementation requirements, the resource consumption and the achieved security.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book

An Introduction to Signal Detection and Estimation

TL;DR: Signal Detection in Discrete Time and Signal Estimation in Continuous Time: Elements of Hypothesis Testing and Elements of Parameter Estimation.
Related Papers (5)