Skip to main content

A Framework for Computing Trust in Mobile Ad-Hoc Networks

  • Chapter
Mobile and Wireless Network Security and Privacy
  • 913 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman A, Hailes S (1997) A Distributed Trust Model. ACM New Security Paradigm Workshop, 1997.

    Google Scholar 

  2. Aberer K, Despotovic Z (2001) Managing Trust in a Peer-2-Peer Information Systems. In: Proceedings of Conference on Information and Knowledge Management (CIKM). Atlanta, Georgia, USA.

    Google Scholar 

  3. Beth T, Borcherding M, Klein B (1994) Valuation of Trust in Open Networks In: Proceedings of the European Symposium on Research in Computer Security (ESORICS). Brighton, UK, pp 3–18.

    Google Scholar 

  4. Blaze M, Feigenbaum J, Lacy J (1996) Decentralized Trust Management. In: Proceedings of the IEEE Conference on Security and Privacy. Oakland, CA, USA.

    Google Scholar 

  5. Buchegger S, Boudec JL (2002) Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad-hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed, Network-based Processing. Canary Islands, Spain, pp 403–410.

    Google Scholar 

  6. Buchegger S, Boudec JL (2002) Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks). MOBIHOC, Switzerland.

    Google Scholar 

  7. Buttyán L, Hubaux JP (2003) Stimulating Cooperation in Self-Organizing Mobile Ad-hoc Networks. Mobile Network and Applications (MONET), vol 8(5), pp 579–592.

    Article  Google Scholar 

  8. Davis CR (2004) A Localized Trust Management Scheme for Ad-hoc Networks. In: Proceedings of the 3rd International Conference on Networking (ICN ’04).

    Google Scholar 

  9. Eschenauer L, Gligor VD, Baras J (2002) On Trust Establishment in Mobile Ad-hoc Networks. In: Proceedings of the Security Protocols Workshop. Cambridge, U.K.

    Google Scholar 

  10. Ghosh T, Pissinou N, Makki K (2005) Towards Designing a Trusted Routing Solution in Mobile Ad-hoc Networks. Mobile Networks and Applications (MONET), vol 10(6), pp 985–995.

    Article  Google Scholar 

  11. Ghosh T, Pissinou N, Makki N (2004) Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad-hoc Networks. In: Proceedings of 29th IEEE Annual Conference on Local Computer Networks (LCN). Tampa, Florida, USA.

    Google Scholar 

  12. Gray E, et al. (2002) Trust Propagation in Small Worlds. In: Proceedings of the 1st International Conference on Trust Management. Heraklion, Crete, Greece.

    Google Scholar 

  13. He Q, Wu D, Khosla P (2004) SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference. Atlanta, Georgia, USA.

    Google Scholar 

  14. Jiang T, Baras JS (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. Tokyo, Japan.

    Google Scholar 

  15. Johnson DB, Maltz DA (1999) The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks”, Internet Draft, MANET Working Group, IETF.

    Google Scholar 

  16. Josang A (2001) A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol 9(3), pp 279.-311.

    Google Scholar 

  17. Josang A (1998) A Subjective Metric of Authentication. In: Proceedings of ESORICS: European Symposium on Research in Computer Security.

    Google Scholar 

  18. Josang A (1997) Prospectives for Modelling Trust in Information Security. In: Proceedings of Australasian Conference on Information Security and Privacy. Springer, pp 2–13.

    Google Scholar 

  19. Kagal L, Finin T, Joshi A (2001) Moving from Security to Distributed Trust in Ubiquitous Computing Environments. IEEE Computer, vol 34(12).

    Google Scholar 

  20. Lamsal P (2002) Requirements for Modeling Trust in Ubiquitous Computing and Ad-hoc Networks. Ad-hoc Mobile Wireless Networks- Research Seminar on Telecommunications Software.

    Google Scholar 

  21. Li X, Lyu MR, Liu J (2004) A Trust Model Based Routing Protocol for Secure Ad-hoc Networks. In: Proceedings 2004 IEEE Aerospace Conference. Big Sky, Montana, U.S.A.

    Google Scholar 

  22. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th annual international conference on Mobile Computing and Networking (MobiCom). Boston, Massachusetts, United States.

    Google Scholar 

  23. Michiardi P, Molva R (2002) CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks. In: Proceedings of the 6th IFIP Communications and Multimedia Security Conference. Portorosz, Slovenia.

    Google Scholar 

  24. Ngai ECH, Lyu MR (2004) Trust and Clustering-Based Authentication Services in Mobile Ad-hoc Networks. In: Proceedings of the 2nd International Workshop on Mobile Distributed Computing (MDC’04). Tokyo, Japan.

    Google Scholar 

  25. Perkins C, Royer E (1999) Ad-hoc On-Demand Distance Vector Routing. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications.

    Google Scholar 

  26. Pirzada AA, McDonald C (2004) Establishing Trust in Pure Ad-hoc Networks. In: 27th Australian Computer Science Conference. Univ. of Otago, Dunedin, New Zealand.

    Google Scholar 

  27. Pissinou N, Ghosh T, Makki K (2004) Collaborative Trust Based Secure Routing in Multihop Ad-hoc Networks. In: Proceedings of The Third IFIP-TC6 Networking Conference (Networking ’04): Springer Verlag, Series:Lecture Notes in Computer Science, vol 3042, pp1446–1451, Athens, Greece.

    Google Scholar 

  28. Theodorakopoulos G, Baras JS (2004) Trust Evaluation in Ad-Hoc Networks. ACM Workshop on Wireless Security (WiSE), Philadelphia, PA, USA.

    Google Scholar 

  29. Verma RRS, O’Mahony D, Tewari H (2001) NTM – Progressive Trust Negotiation in Ad-hoc Networks. In: Proceedings of the 1st joint IEI/IEE Symposium on Telecommunications Systems Research. Dublin, Ireland.

    Google Scholar 

  30. Yan Z, Zhang P, Virtanen T (2003) Trust Evaluation Based Security Solution in Ad-hoc Networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems.

    Google Scholar 

  31. Zeng X, Bagrodia R, Gerla M (1998) Glomosim: A Library for Parallel Simulation of Large-scale Wireless Networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS). Alberta, Canada.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Ghosh, T., Pissinou, N., Makki, K., Farhat, A. (2007). A Framework for Computing Trust in Mobile Ad-Hoc Networks. In: Makki, S.K., Reiher, P., Makki, K., Pissinou, N., Makki, S. (eds) Mobile and Wireless Network Security and Privacy. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71058-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-71058-7_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-71057-0

  • Online ISBN: 978-0-387-71058-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics