Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

被引:33
作者
Omar, Mawloud [1 ]
Challal, Yacine [2 ]
Bouabdallah, Abdelmadjid [2 ]
机构
[1] Univ AMira, ReSyD, Bejaia, Algeria
[2] Univ Technol Compiegne, Heudiasyc UMR CNRS 6599, F-60206 Compiegne, France
关键词
Trust; Public-key; Certificate; Security; Mobile ad hoc networks; ESTABLISHMENT SCHEME; AUTHORITY; SECURITY; SERVICE; MANET;
D O I
10.1016/j.jnca.2011.08.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in such network is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in trust models framework to securing mobile ad hoc networks. The majority of well-known approaches is based on public-key certificates, and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certificate authorities. In this paper, we survey and classify the existing trust models that are based on public-key certificates proposed for mobile ad hoc networks, and then we discuss and compare them with respect to some relevant criteria. Also, we have developed analysis and comparison among trust models using stochastic Petri nets in order to measure the performance of each one with what relates to the certification service availability. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:268 / 286
页数:19
相关论文
共 64 条
[1]  
ABDULRAHMAN A, 1997, J ELECT COMMERCE, V10, P27
[2]  
[Anonymous], 2002, P 1 INT WORKSH PEER
[3]  
[Anonymous], ACM COMPUTING SURVEY
[4]  
[Anonymous], P 6 IFIP COMM MULT S
[5]   A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks [J].
Ayday, E. ;
Fekri, F. .
AD HOC NETWORKS, 2010, 8 (02) :181-192
[6]  
AZIZ B, 2008, P INF COMM TECHN
[7]  
BONH D, 2001, ADV CRYPTOLOGY
[8]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[9]  
Buchegger S., 2002, P ACM MOBIHOC
[10]   A distributed admission control system for MANET environments supporting multipath routing protocols [J].
Calafate, Carlos T. ;
Oliver, Jose ;
Cano, Juan-Carlos ;
Manzoni, Pietro ;
Malumbres, Manuel P. .
MICROPROCESSORS AND MICROSYSTEMS, 2007, 31 (04) :236-251