Journal ArticleDOI
Information theoretic framework of trust modeling and evaluation for ad hoc networks
TLDR
Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.Abstract:
The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.read more
Citations
More filters
Journal ArticleDOI
A Survey on Trust Management for Mobile Ad Hoc Networks
TL;DR: This work seeks to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust"derived from information and communication networks to obtain a composite trust metric.
Proceedings ArticleDOI
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
TL;DR: This paper proposes a framework for data-centric trust establishment: first, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques.
Journal ArticleDOI
Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
TL;DR: A detailed survey on various trust computing approaches that are geared towards MANETs is presented, including trust propagation, prediction and aggregation algorithms, the influence of network dynamics on trust dynamics and the impact of trust on security services are analyzed.
Journal ArticleDOI
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
TL;DR: A new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering and reduces the cost of trust evaluation and is more suitable for large-scale sensor networks.
Journal ArticleDOI
Trust management in wireless sensor networks
TL;DR: The goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities, and to explore the interplay among the implementation requirements, the resource consumption and the achieved security.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Dynamic Source Routing in Ad Hoc Wireless Networks.
David B. Johnson,David A. Maltz +1 more
TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI
Dynamic Source Routing in Ad Hoc Wireless Networks
David B. Johnson,David A. Maltz +1 more
TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book
An Introduction to Signal Detection and Estimation
TL;DR: Signal Detection in Discrete Time and Signal Estimation in Continuous Time: Elements of Hypothesis Testing and Elements of Parameter Estimation.