A Framework for Computing Trust in Mobile Ad-Hoc Networks

  • Tirthankar Ghosh
  • Niki Pissinou
  • Kia Makki
  • Ahmad Farhat


Malicious Node Malicious Behavior Trust Computation Selfish Behavior Node Speed 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman A, Hailes S (1997) A Distributed Trust Model. ACM New Security Paradigm Workshop, 1997.Google Scholar
  2. 2.
    Aberer K, Despotovic Z (2001) Managing Trust in a Peer-2-Peer Information Systems. In: Proceedings of Conference on Information and Knowledge Management (CIKM). Atlanta, Georgia, USA.Google Scholar
  3. 3.
    Beth T, Borcherding M, Klein B (1994) Valuation of Trust in Open Networks In: Proceedings of the European Symposium on Research in Computer Security (ESORICS). Brighton, UK, pp 3–18.Google Scholar
  4. 4.
    Blaze M, Feigenbaum J, Lacy J (1996) Decentralized Trust Management. In: Proceedings of the IEEE Conference on Security and Privacy. Oakland, CA, USA.Google Scholar
  5. 5.
    Buchegger S, Boudec JL (2002) Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad-hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed, Network-based Processing. Canary Islands, Spain, pp 403–410.Google Scholar
  6. 6.
    Buchegger S, Boudec JL (2002) Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks). MOBIHOC, Switzerland.Google Scholar
  7. 7.
    Buttyán L, Hubaux JP (2003) Stimulating Cooperation in Self-Organizing Mobile Ad-hoc Networks. Mobile Network and Applications (MONET), vol 8(5), pp 579–592.CrossRefGoogle Scholar
  8. 8.
    Davis CR (2004) A Localized Trust Management Scheme for Ad-hoc Networks. In: Proceedings of the 3rd International Conference on Networking (ICN ’04).Google Scholar
  9. 9.
    Eschenauer L, Gligor VD, Baras J (2002) On Trust Establishment in Mobile Ad-hoc Networks. In: Proceedings of the Security Protocols Workshop. Cambridge, U.K.Google Scholar
  10. 10.
    Ghosh T, Pissinou N, Makki K (2005) Towards Designing a Trusted Routing Solution in Mobile Ad-hoc Networks. Mobile Networks and Applications (MONET), vol 10(6), pp 985–995.CrossRefGoogle Scholar
  11. 11.
    Ghosh T, Pissinou N, Makki N (2004) Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad-hoc Networks. In: Proceedings of 29th IEEE Annual Conference on Local Computer Networks (LCN). Tampa, Florida, USA.Google Scholar
  12. 12.
    Gray E, et al. (2002) Trust Propagation in Small Worlds. In: Proceedings of the 1st International Conference on Trust Management. Heraklion, Crete, Greece.Google Scholar
  13. 13.
    He Q, Wu D, Khosla P (2004) SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference. Atlanta, Georgia, USA.Google Scholar
  14. 14.
    Jiang T, Baras JS (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. Tokyo, Japan.Google Scholar
  15. 15.
    Johnson DB, Maltz DA (1999) The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks”, Internet Draft, MANET Working Group, IETF.Google Scholar
  16. 16.
    Josang A (2001) A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol 9(3), pp 279.-311.Google Scholar
  17. 17.
    Josang A (1998) A Subjective Metric of Authentication. In: Proceedings of ESORICS: European Symposium on Research in Computer Security.Google Scholar
  18. 18.
    Josang A (1997) Prospectives for Modelling Trust in Information Security. In: Proceedings of Australasian Conference on Information Security and Privacy. Springer, pp 2–13.Google Scholar
  19. 19.
    Kagal L, Finin T, Joshi A (2001) Moving from Security to Distributed Trust in Ubiquitous Computing Environments. IEEE Computer, vol 34(12).Google Scholar
  20. 20.
    Lamsal P (2002) Requirements for Modeling Trust in Ubiquitous Computing and Ad-hoc Networks. Ad-hoc Mobile Wireless Networks- Research Seminar on Telecommunications Software.Google Scholar
  21. 21.
    Li X, Lyu MR, Liu J (2004) A Trust Model Based Routing Protocol for Secure Ad-hoc Networks. In: Proceedings 2004 IEEE Aerospace Conference. Big Sky, Montana, U.S.A.Google Scholar
  22. 22.
    Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th annual international conference on Mobile Computing and Networking (MobiCom). Boston, Massachusetts, United States.Google Scholar
  23. 23.
    Michiardi P, Molva R (2002) CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks. In: Proceedings of the 6th IFIP Communications and Multimedia Security Conference. Portorosz, Slovenia.Google Scholar
  24. 24.
    Ngai ECH, Lyu MR (2004) Trust and Clustering-Based Authentication Services in Mobile Ad-hoc Networks. In: Proceedings of the 2nd International Workshop on Mobile Distributed Computing (MDC’04). Tokyo, Japan.Google Scholar
  25. 25.
    Perkins C, Royer E (1999) Ad-hoc On-Demand Distance Vector Routing. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications.Google Scholar
  26. 26.
    Pirzada AA, McDonald C (2004) Establishing Trust in Pure Ad-hoc Networks. In: 27th Australian Computer Science Conference. Univ. of Otago, Dunedin, New Zealand.Google Scholar
  27. 27.
    Pissinou N, Ghosh T, Makki K (2004) Collaborative Trust Based Secure Routing in Multihop Ad-hoc Networks. In: Proceedings of The Third IFIP-TC6 Networking Conference (Networking ’04): Springer Verlag, Series:Lecture Notes in Computer Science, vol 3042, pp1446–1451, Athens, Greece.Google Scholar
  28. 28.
    Theodorakopoulos G, Baras JS (2004) Trust Evaluation in Ad-Hoc Networks. ACM Workshop on Wireless Security (WiSE), Philadelphia, PA, USA.Google Scholar
  29. 29.
    Verma RRS, O’Mahony D, Tewari H (2001) NTM – Progressive Trust Negotiation in Ad-hoc Networks. In: Proceedings of the 1st joint IEI/IEE Symposium on Telecommunications Systems Research. Dublin, Ireland.Google Scholar
  30. 30.
    Yan Z, Zhang P, Virtanen T (2003) Trust Evaluation Based Security Solution in Ad-hoc Networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems.Google Scholar
  31. 31.
    Zeng X, Bagrodia R, Gerla M (1998) Glomosim: A Library for Parallel Simulation of Large-scale Wireless Networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS). Alberta, Canada.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Tirthankar Ghosh
    • 1
  • Niki Pissinou
    • 2
  • Kia Makki
    • 2
  • Ahmad Farhat
    • 2
  1. 1.Computer Networking and Applications, College of Science and EngineeringSt. Cloud State UniversitySt. Cloud MinnesotaUSA
  2. 2.Telecommunications and Information Technology Institute, College of Engineering and ComputingFlorida International UniversityMiamiUSA

Personalised recommendations