Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
An Overview of the Interpretations of Trust and Reputation
AICT '07 Proceedings of the The Third Advanced International Conference on Telecommunications
JiST/MobNet: combined simulation, emulation, and real-world testbed for ad hoc networks
Proceedings of the second ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Central misbehavior evaluation for VANETs based on mobility data plausibility
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Hi-index | 0.00 |
Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the reliability of all communication and data exchange on the network depends on collaboration of participating network nodes.In order to strengthen overall mobile network security and avoid attack, malicious nodes should be detected and appropriate measures taken, e.g. exclusion from network communications.In order to effectively identify malicious nodes we propose a system for Trust Evaluation and Reputation Exchange for Cooperative intrusion detection in MANETs (TEREC). Each node should monitor its directly connected neighbour nodes and resulting measurements and trust information should be gathered and exchanged cooperatively between all network nodes. These measurements when combined with information from other nodes can construct a node reputation value representing the trustworthiness of a specific network node.We propose to split reputation information into two values:trust and confidence. This allows each node to successively determine the reliability of other nodes without the need or reliance on a static, pre-established trust infrastructure (e.g.digital certificates) which requires significant overhead and can not be recovered once compromised.TEREC is evaluated via simulation and its performance measured in the presence of an increasing amount of malicious nodes. Evaluation results show that a benign majority of nodes prevail over malicious attacking nodes as they are able to accurately classify network nodes based on reputation estimations.