A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

被引:27
作者
Boukerche, Azzedine [1 ]
Ren, Yonglin [1 ]
机构
[1] Univ Ottawa, SITE, Ottawa, ON, Canada
来源
PE-WASUN'08: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF WIRELESS AD-HOC, SENSOR, AND UBIQUITOUS NETWORKS | 2008年
关键词
Mobile Security; Trust Evaluation; Reputation Model; Secure Management; Mobile Ad hoc Networks;
D O I
10.1145/1454609.1454628
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Robust trust and reputation evaluation services are significant to ensure the security of mobile ad hoc networks, as centralized administration is not easy to be applied and these networks do not have fixed infrastructures. However, malicious behaviors obviously can make wireless and mobile networks at risk so malicious nodes should be detected and excluded. In this paper, we study the issue of how to evaluate efficiently a node's reputation in a distributed approach. First, a set of management mechanisms is presented to prevent effectively malicious nodes from entering the trusted community. Then we formulate a comprehensive computational reputation model. Through a set of extensive simulation experiments based on the ns-2 simulator, our simulation results demonstrate that our system indeed are more sensitive to suspicious behaviors and peers, and thereby improper behaviors within a community are prevented effectively. Therefore, in dynamic but agile environments, our computational reputation system exhibits high adaptation and low complexity, so that it leads to secure communication among mobile nodes.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 27 条
[1]  
[Anonymous], AD HOC DEMA IN PRESS
[2]  
BARBER KS, 2007, P INT C AUT AG MULT, P1361
[3]  
Boukerche A, 2007, GLOB TELECOMM CONF, P1268
[4]   Performance evaluation of an anonymity providing protocol for wireless ad hoc networks [J].
Boukerche, Azzedine ;
El-Khatib, Khalil ;
Xu, Li ;
Korba, Larry .
PERFORMANCE EVALUATION, 2006, 63 (11) :1094-1109
[5]  
BRAHIM GB, 2007, P INT C WIR COMM MOB, P158
[6]  
Broch J., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P85, DOI 10.1145/288235.288256
[7]  
CARRUTHERS R, 2005, P 8 ACM INT S MOD AN, P2
[8]   Trusting routers and relays in ad hoc networks [J].
Dewan, P ;
Dasgupta, P .
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, :351-358
[9]  
GANERIWAL S, 2004, P 2 ACM WORKSH SEC A, P66
[10]  
GRAJEK S, 2002, P 30 ANN ACM SIGUCCS, P251