Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks

  • Authors:
  • Seong-Soo Park;Jong-Hyouk Lee;Tai-Myoung Chung

  • Affiliations:
  • Department of Computer Engineering, Sungkyunkwan university, Suwon, Korea 440-746;Department of Computer Engineering, Sungkyunkwan university, Suwon, Korea 440-746;School of Information & Communication Engineering, Sungkyunkwan university, Suwon, Korea 440-746

  • Venue:
  • ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In wireless ad-hoc networks, all nodes need to have functions able to authenticate each other and so it is critical to know the trustworthiness of each node in such environments. This paper proposes an authentication system for ad-hoc networks, based on a clustering and trust model. Firstly, methods of solving authentication problems, which occur in ad-hoc networks, are discussed. Next, fuzzy logic inference is introduced, which is used as a trust evaluation method for each node and provides both local and global trust values. The reputation is used in the calculation of the trust value. Using the trust value of a trustor, a more sophisticated trust value can be computed. If a node moves from one cluster to another, the trust level of the node is determined by the certificate issued by the previous introducers. In addition, it is demonstrated that the proposed model can monitor and isolate malicious nodes in order to provide enhancements to the network's overall authentication rate.