Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Key agreement in ad hoc networks
Computer Communications
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
Reputation modeling for wireless sensor networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Hi-index | 0.00 |
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. We propose a robust cooperative trust establishment scheme to improve the reliability of packet delivery in MANETs, particularly in the presence of malicious nodes. In the proposed scheme, each node determines the trustworthiness of the other nodes with respect to reliable packet forwarding by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. First-hand trust information for neighbor nodes is obtained via direct observations at the MAC layer whereas first-hand information for non-neighbor nodes is obtained via feedback from acknowledgements sent in response to data packets. The proposed scheme exploits information sharing among nodes to accelerate the convergence of trust establishment procedures, yet is robust against the propagation of false trust information by malicious nodes. We present simulation results which demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving nodes that are malicious with respect to both packet forwarding and trust propagation.