Skip to main content

On Trust Establishment in Mobile Ad-Hoc Networks

  • Conference paper
Security Protocols (Security Protocols 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Included in the following conference series:

Abstract

We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc networks, and illustrate the importance of evaluation metrics in trust establishment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babaoglu, O., Meling, H., Montresor, A.: Anthill: A Framework for the Development of Agent-Based Peer-to-Peer System, Technical Report UBLCS-2001-09, University of Bologna, Italy

    Google Scholar 

  2. Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proc. of the ISOC 2002 Network and Distributed Systems Security Symposium (February 2002)

    Google Scholar 

  3. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875. Springer, Heidelberg (1994)

    Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164–173 (1996)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for publickey infrastructures. In: Proc. Cambridge 1998 Security Protocols International Workshop, pp. 59–63 (1998)

    Google Scholar 

  6. Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute on the Sciences of Complexity. Oxford University Press, Oxford (July 1999)

    Google Scholar 

  7. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. of the International Computer Science Institute (ICSI) Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA (2000)

    Google Scholar 

  8. Common Criteria for Information Technology Security Evaluation – Part 3: Security Assurance Requirements, version 2.0, CCIB-98-028, National Institute of Standards and Technology (May 1998), http://niap.nist.gov

  9. Gligor, V.D., Luan, S.-W., Pato, J.N.: On inter-realm authentication in large distributed systems. In: Proc. of the 1992 IEEE Symposium on Research in Security and Privacy (May 1992)

    Google Scholar 

  10. Gnutella, http://www.gnutellanews.com/

  11. Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, pp. 2–14 (2000)

    Google Scholar 

  12. Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC 2001 (2001)

    Google Scholar 

  13. Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 93–112. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000) (November 2000)

    Google Scholar 

  15. Lampson, B.W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)

    Article  Google Scholar 

  16. Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)

    Google Scholar 

  17. Napster, http://www.napster.com

  18. Reiter, M.K., Stubblebine, S.G.: Toward acceptable metrics of authentication. In: Proc. of the IEEE Conference on Security and Privacy, Oakland, CA (1997)

    Google Scholar 

  19. Reiter, M.K., Stubblebine, S.G.: Path independence for authentication in large-scale systems. In: Proc. of the 4th ACM Conference on Computer and Communications Security (April 1997)

    Google Scholar 

  20. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (1999)

    Google Scholar 

  21. Stajano, F.: The resurrecting duckling – What next? In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (April 2000)

    Google Scholar 

  22. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for Internet applications. In: Proc. of the 2001 ACM SIGCOMM Conference, San Diego, CA, pp. 149–160 (2001)

    Google Scholar 

  23. Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Transactions on Computer Systems 12(1), 3–32 (1994)

    Article  Google Scholar 

  24. Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems—A distributed authentication perspective. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, May 1993, pp. 150–164 (1993)

    Google Scholar 

  25. Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995), http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-user.html

    Google Scholar 

  26. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Eschenauer, L., Gligor, V.D., Baras, J. (2004). On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics