Information theoretic framework of trust modeling and evaluation for ad hoc networks

被引:6
作者
Sun, YL [1 ]
Yu, W
Han, Z
Liu, KJR
机构
[1] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20740 USA
关键词
ad hoc networks; security; trust modeling and evaluation;
D O I
10.1109/JSAC.2005.0861389
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The performance of ad hoe networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
引用
收藏
页码:305 / 317
页数:13
相关论文
共 39 条
  • [1] Abdul-Raham A., 1998, PROC 1997 WORKSHOP N, P48
  • [2] [Anonymous], 2003, P WIOPT 03 MOD OPT M
  • [3] [Anonymous], 2004, WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security, DOI DOI 10.1145/1023646.1023648
  • [4] [Anonymous], 2000, Proc. of the 21st International Conference on Information Systems
  • [5] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [6] Buchegger S., 2002, P 3 ACM INT S MOB AD, P226
  • [7] Clarke D., 2001, Journal of Computer Security, V9, P285
  • [8] Cover TM, 2006, Elements of Information Theory
  • [9] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [10] Gambetta D., 1988, TRUST MAKING BREAKIN, DOI [10.2307/2234217, DOI 10.2307/591021]