Advertisement

A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks

  • R. Deepa
  • S. Swamynathan
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

Trust computation and management are significant areas of research in mobile ad hoc networks, since the mobile nodes are vulnerable to security threats. A trust mechanism allows the participating nodes to maintain trust relationships among themselves, by evaluating one another and deciding which nodes can interact with one another and whether they can. In this paper, a trust model for the directory-based service discovery is proposed, using the Dezert-Smarandache Theory (DSmT). The trust value of a node is computed by another node, based on the behavior of nodes, when a service provider node provides the service to the requesting node, during the service discovery process. An evidential theory, DSmT handles uncertain and paradoxical information that may arise from the fusion of several sources of evidences. Simulations were carried out, to analyze trust values of the requester nodes and packet delivery ratio, to show the efficiency of the proposed model.

Keywords

trust mobile ad hoc networks service discovery directory nodes Dezert-Smarandache Theory direct trust recommendation evidential theory 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cho, J.H., Swami, A.: A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tut. 13(4), 562–583 (2011)CrossRefGoogle Scholar
  2. 2.
    Cho, J.H., Swami, A., Chen, I.R.: Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. In: 12th IEEE International Conference on Computational Science and Engineering, pp. 641–650. IEEE Press, New York (2009)Google Scholar
  3. 3.
    Cook, K.S. (ed.): Trust in Society. Russell Sage Foundation Series on Trust, New York (2003)Google Scholar
  4. 4.
    Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, New Jersey (1976)zbMATHGoogle Scholar
  5. 5.
    Dezert, J.: Foundations for a New Theory of Plausible and Paradoxical Reasoning. Information and Security 9, 13–57 (2002)Google Scholar
  6. 6.
    Dempster, A.P.: Upper and Lower Probabilities Induced by Multivalued Mapping. Annals of Mathematical Statistics 28, 325–339 (1967)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory. Sandia Na-tional Laboratories, Albuquerque, New Mexico (2002)Google Scholar
  8. 8.
    Deepa, R., Swamynathan, S.: The DBF-based Semantic Service Discovery for Mobile Ad Hoc Networks. Canadian Journal Electrical and Computer Engineering (accepted for Publication, 2014)Google Scholar
  9. 9.
    Deepa, R., Swamynathan, S.: AHP-Entropy-TOPSIS based Clustering Protocol for Mobile Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks. Old City Publishing (accepted for publication, 2014)Google Scholar
  10. 10.
    Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey. IEEE Commun. Surv. Tut. 14(2), 279–298 (2012)CrossRefGoogle Scholar
  11. 11.
    Kumar, A., Aggarwal, A.: Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 240–251. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    Campo, C., Almenárez, F., Díaz, D., García-Rubio, C., López, A.M.: Secure Service Discovery based on Trust Management for Ad-hoc Networks. J. Univer. Comput. Sci. 12(3), 340–356 (2006)Google Scholar
  13. 13.
    Han, S., Kim, J.M., Bin, H.: Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network. In: International Conference on Information Science and Security, pp. 171–176 (2008)Google Scholar
  14. 14.
    McNamara, L., Mascolo, C., Capra, L.: Trust and Mobility Aware Service Provision for Pervasive Computing. In: 1st International Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, pp. 603–610 (2006)Google Scholar
  15. 15.
    Ahamed, S.I., Sharmin, M.: A trust-based secure service discovery (TSSD) model for per-vasive computing. Computer Communications 31(18), 4281–4293 (2008)CrossRefGoogle Scholar
  16. 16.
    Glowacka, J., Amanowicz, M.: Application of Dezert-Smarandache theory for tactical MANET security enhancement. In: IEEE Military Communications and Information Systems Conference, pp. 1–6 (2012)Google Scholar
  17. 17.
    Guo, D., Wu, J., Chen, H., Yuan, Y., Luo, X.: The Dynamic Bloom Filters. IEEE T. Knowl. Data En. 22(1), 120–133 (2010)CrossRefGoogle Scholar
  18. 18.
    Smarandache, F., Dezert, J.: Advances and Applications of DSmT for Information Fusion, Collected works. Arp Publishers (2004)Google Scholar
  19. 19.
    Wang, J., Sun, H.J.: A new evidential trust model for open communities. Comput. Stand. Inter. 31(5), 994–1001 (2009)CrossRefGoogle Scholar
  20. 20.
    Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: 27th Australian Conference on Computer Science, pp. 47–54 (2004)Google Scholar
  21. 21.
    Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Conference on Elec-tronic Commerce, pp. 17–19 (2002)Google Scholar
  22. 22.
    Feng, R., Che, S., Wang, X., Yu, N.: Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks. Int. J. Distrib. Sens. N, 1–9 (2013)Google Scholar
  23. 23.
    The Network Simulator, ns-2, available from World Wide Web, http://nsnam.isi.edu/nsnam
  24. 24.
    Yoon, J., Liu, M., Noble, B.: Random Waypoint Considered Harmful. In: 22nd Annual Joint Conference on IEEE Computer and Communications, pp. 1312–1321 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • R. Deepa
    • 1
  • S. Swamynathan
    • 1
  1. 1.Department of Information Science and Technology, College of EngineeringAnna UniversityChennaiIndia

Personalised recommendations