Trust Establishment In Pure Ad-hoc Networks

被引:0
作者
A. A. Pirzada
C. Mcdonald
机构
[1] The University of Western Australia,School of Computer Science & Software Engineering
来源
Wireless Personal Communications | 2006年 / 37卷
关键词
trust; security; ad-hoc; networks; protocols;
D O I
暂无
中图分类号
学科分类号
摘要
An ad-hoc network is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. Each node in the network pledges to help its neighbours by passing packets to and fro, in return of a similar assurance from them. All is well if all participating nodes uphold such an altruistic behaviour. However, this is not always the case and often nodes are subjected to a variety of attacks by other nodes. These attacks range from naive passive eavesdropping to vicious battery draining attacks. Routing protocols, data, battery power and bandwidth are the common targets of these attacks. In order to overcome such attacks a number of routing protocols have been devised that use cryptographic algorithms to secure the routing mechanism, which in turn protects the other likely targets. A limiting requirement regarding these protocols is the reliance on an omnipresent, and often omniscient, trust authority. In our opinion, this reliance on a central entity is against the very nature of ad-hoc networks, which are supposed to be improvised and spontaneous. We present in this paper, a trust-based model for communication in ad-hoc networks that is based on individual experience rather than on a third party advocating trust levels. The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in pure ad-hoc networks.
引用
收藏
页码:139 / 168
页数:29
相关论文
共 11 条
[1]  
Royer E.M.(1999)A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks IEEE Personal Communications Magazine 6 46-55
[2]  
Toh C.K.(1995)An Integrative Model of Organizational Trust Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking 20 709-734
[3]  
Mayer R.C.(1999)Securing Ad-Hoc Networks IEEE Network Magazine 13 24-30
[4]  
Davis J.H.(1981)Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently Changing Topology IEEE Transactions on Communications 29 11-18
[5]  
Schoorman F.D.(2004)An Address Assignment for the Automatic Configuration of Mobile Ad-Hoc Networks Personal and Ubiquitous Computing 8 47-54
[6]  
Zhou L.(undefined)undefined undefined undefined undefined-undefined
[7]  
Haas Z.J.(undefined)undefined undefined undefined undefined-undefined
[8]  
Gafni E.(undefined)undefined undefined undefined undefined-undefined
[9]  
Bertsekas D.(undefined)undefined undefined undefined undefined-undefined
[10]  
Tayal A.P.(undefined)undefined undefined undefined undefined-undefined