Skip to main content

Secure Trust Metadata Management for Mobile Ad-Hoc Networks

  • Conference paper
Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

  • 987 Accesses

Abstract

A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Trust metadata created by individual nodes, based on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure semantics-aware trust metadata management scheme to partition and store an information network of trust metadata of nodes in a MANET. That is, trust metadata is securely propagated to and stored at certain geographic locations inside the network itself, based on its semantics. The TA can send queries of various types in the network to obtain the trust metadata of its interest. This scheme is robust to several security attacks that attempt to disrupt the availability of trust metadata in the network. Our analysis shows that the proposed scheme provides desirable security and functionality properties with low query overhead.

This work was supported by the NS-CTA grant from the Army Research Laboratory. The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of ARL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, W., Joshi, A., Finin, T.: Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach. In: Proc. IEEE MDM (2010)

    Google Scholar 

  2. Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. Proc. IEEE Communications Magazine 46, 108–114 (2008)

    Google Scholar 

  3. Sun, Y., Yu, W., Han, Z., Liu, K.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. Proc. IEEE Journal on Selected Areas in Communications 24, 305–317 (2006)

    Article  MATH  Google Scholar 

  4. Velloso, P., Laufer, R., Cunha, D., Duarte, O., Pujolle, G.: Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model. Proc. IEEE Transactions on Network and Service Management 7, 172–185 (2010)

    Article  Google Scholar 

  5. Balakrishnan, V., Varadharajan, V., Tupakula, U., Lues, P.: TEAM: Trust Enhanced Security Architecture for Mobile Ad-Hoc Networks. In: Proc. IEEE ICON (2007)

    Google Scholar 

  6. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom (2000)

    Google Scholar 

  7. Karp, B., Kung, H.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. ACM MobiCom (2000)

    Google Scholar 

  8. Wang, Y., Singh, M.: Trust Representation and Aggregation in a Distributed Agent System. In: Proc. ACM AAAI (2006)

    Google Scholar 

  9. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: Proc. ACM CCS (2006)

    Google Scholar 

  10. Yu, S., Ren, K., Lou, W.: FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. In: Proc. IEEE INFOCOM (2009)

    Google Scholar 

  11. Falcone, R., Pezzulo, G., Castelfranchi, C.: A Fuzzy Approach to a Belief-Based Trust Computation. In: Proc. ACM AAMAS (2002)

    Google Scholar 

  12. Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Adhoc Networks: a Survey. Proc. IEEE Communications Surveys and Tutorials 14, 279–298 (2011)

    Article  Google Scholar 

  13. Zhu, B., Wan, Z., Kankanhalli, M., Bao, F., Deng, R.: Anonymous Secure Routing in Mobile Ad-Hoc Networks. In: Proc. IEEE Local Computer Networks (2004)

    Google Scholar 

  14. GloMoSim: Global Mobile Information Systems Simulation Library, http://pcl.cs.ucla.edu/projects/glomosim

  15. Sun, Y., Han, Z., Liu, K.: Defense of Trust Management Vulnerabilities in Distributed Networks. Proc. IEEE Communications Magazine. 46, 112–119 (2008)

    Article  Google Scholar 

  16. Natarajan, V., Zhu, S., Srivatsa, M., Opper, J.: Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks. In: Proc. IEEE AINA (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Natarajan, V., Yang, Y., Zhu, S. (2012). Secure Trust Metadata Management for Mobile Ad-Hoc Networks. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics