scispace - formally typeset
Open AccessJournal ArticleDOI

On trust models and trust evaluation metrics for ad hoc networks

Reads0
Chats0
TLDR
This work uses the theory of semirings to show how two nodes can establish an indirect trust relation without previous direct interaction, and shows that the semiring framework is flexible enough to express other trust models, most notably PGP's Web of Trust.
Abstract
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation of trust evidence in ad hoc networks. Because of the dynamic nature of ad hoc networks, trust evidence may be uncertain and incomplete. Also, no preestablished infrastructure can be assumed. The evaluation process is modeled as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We give intuitive requirements and discuss design issues for any trust evaluation algorithm. Using the theory of semirings, we show how two nodes can establish an indirect trust relation without previous direct interaction. We show that our semiring framework is flexible enough to express other trust models, most notably PGP's Web of Trust. Our scheme is shown to be robust in the presence of attackers.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on Trust Management for Mobile Ad Hoc Networks

TL;DR: This work seeks to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust"derived from information and communication networks to obtain a composite trust metric.
Proceedings ArticleDOI

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks

TL;DR: This paper proposes a framework for data-centric trust establishment: first, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques.
Journal ArticleDOI

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

TL;DR: This work proposes a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes and discovers that there exists an optimal trust threshold for minimizing false positives and false negatives.
Journal ArticleDOI

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey

TL;DR: A detailed survey on various trust computing approaches that are geared towards MANETs is presented, including trust propagation, prediction and aggregation algorithms, the influence of network dynamics on trust dynamics and the impact of trust on security services are analyzed.
Journal ArticleDOI

Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks

TL;DR: A new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering and reduces the cost of trust evaluation and is more suitable for large-scale sensor networks.
References
More filters
Journal ArticleDOI

A note on two problems in connexion with graphs

TL;DR: A tree is a graph with one and only one path between every two nodes, where at least one path exists between any two nodes and the length of each branch is given.
Journal ArticleDOI

Factor graphs and the sum-product algorithm

TL;DR: A generic message-passing algorithm, the sum-product algorithm, that operates in a factor graph, that computes-either exactly or approximately-various marginal functions derived from the global function.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Proceedings ArticleDOI

The Eigentrust algorithm for reputation management in P2P networks

TL;DR: An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
Related Papers (5)