Skip to main content

On Trust Evaluation in Mobile Ad Hoc Networks

  • Conference paper

Abstract

Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized Link State Routing Protocol. RFC 3626, IETF (October 2003)

    Google Scholar 

  2. Marsh, S.P.: Formalising trust as a computational concept. PhD thesis, University of Stirling (1994)

    Google Scholar 

  3. Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proc. of 35th Hawaii International Conference on System Sciences, HICSS 2002, Hawaii, USA (January 2002)

    Google Scholar 

  4. Sun, Y., Yu, W., Han, Z., Ray Liu, K.J.: Trust Modeling and Evaluation in Ad Hoc Networks. In: Proc. of IEEE Global Telecommunications Conference, GLOBECOM’05, St, Louis MO, USA (December 2005)

    Google Scholar 

  5. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of Trust and Distrust. In: Proc. of 13th International Conference on World Wide Web, WWW 2004, New York NY, USA (May 2004)

    Google Scholar 

  6. Theodorakopoulos, G., Baras, J.S.: Trust Evaluation in Ad-Hoc Networks. In: Proc. of 3rd ACM Workshop on Wireless Security, WiSe 2004, Philadelphia PA, USA (October 2004)

    Google Scholar 

  7. Tang, H., Salmanian, M.: Lightweight Integrated Authentication Protocol for Tactical MANETs. In: Proc. of IEEE TrustCom 2008, Zhangjiajie, China (November 2008)

    Google Scholar 

  8. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the Sixth Annual Conference on Mobile Computing and Networking, Boston, MA, USA (August 2000)

    Google Scholar 

  9. Gilbert, E.N.: Random Plane Networks. Journal of the Society for Industrial and Applied Mathematics 9(4), 533–543 (1961)

    Article  MathSciNet  MATH  Google Scholar 

  10. Philips, T., Panwar, S., Tantawi, A.: Connectivity Properties of a Packet Radio Network Model. IEEE Transactions on Information Theory 35(5), 1044–1047 (1989)

    Article  Google Scholar 

  11. Meester, R., Roy, R.: Continuum Percolation. Cambridge University Press, Cambridge (1996)

    Book  MATH  Google Scholar 

  12. Gupta, P., Kumar, P.R.: Critical Power for Asymptotic Connectivity in Wireless Networks. In: McEneany, W.M., et al. (eds.) Stochastic Analysis, Control, Optimization and Applications, pp. 547–566. Birkhauser, Boston (1998)

    Google Scholar 

  13. Maplesoft: Math Software for Engineers, Educators & Students, http://www.maplesoft.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Nguyen, D.Q., Lamont, L., Mason, P.C. (2009). On Trust Evaluation in Mobile Ad Hoc Networks. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04434-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04433-5

  • Online ISBN: 978-3-642-04434-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics