Cluster-Based Trust Model against Attacks in Ad-hoc Networks

被引:3
作者
Park, Seong-Soo [1 ]
Lee, Jong-Hyouk [1 ]
Chung, Tai-Myoung [2 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
[2] Sungkyunkwan Univ, Dept Informat & Commun Engn, Suwon 440746, South Korea
来源
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ICCIT.2008.112
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In ad-hoc environments, all nodes have function to set themselves a route and build a network. It is important how trustable each node is in the environment. This study proposes the cluster-based trust model, and uses the model to discuss how you can solve some possible problems occurred in the network. The reputation from a neighboring node is applied to the calculation of the trust value. If the trust value of a truster is used as a weight, more sophisticated calculation of the trust value is available. When you create a cluster, all nodes in the cluster can fully trust the selected head, if entire nodes in the cluster participate in the head competition. And then, the head node issues the certificate that shows the trust level of each member node. If a node moves from one cluster to another, the trust level of the node is determined by the certificate issued by the previous cluster-head. The model proposed by this study can monitor the selfish behavior of nodes in the network and isolate the selfish nodes from the network to enhance the effectiveness throughout the network.
引用
收藏
页码:526 / +
页数:2
相关论文
共 12 条
  • [1] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [2] Chadwick DW, 2005, LECT NOTES COMPUT SC, V3477, P108
  • [3] Gambetta D., 1988, TRUST MAKING BREAKIN, DOI [10.2307/2234217, DOI 10.2307/591021]
  • [4] ISMAIL R, 2002, P 15 BLED C EL COMM
  • [5] Cluster-based trust evaluation scheme in an ad hoc network
    Jin, S
    Park, C
    Choi, D
    Chung, K
    Yoon, H
    [J]. ETRI JOURNAL, 2005, 27 (04) : 465 - 468
  • [6] MASSA P, 2004, T040607 I TRENT CULT
  • [7] Ruohomaa S, 2005, LECT NOTES COMPUT SC, V3477, P77
  • [8] SCHEIN AI, 2002, METHODS METRICS COLD
  • [9] Ad hoc and P2P security
    Shieh, SW
    Wallach, DS
    [J]. IEEE INTERNET COMPUTING, 2005, 9 (06) : 14 - 15
  • [10] Sun YL, 2006, IEEE J SEL AREA COMM, V24, P305, DOI [10.1109/JSAC.2005.861389, 10.1109/JSAC.2005.0861389]