Information theoretic framework of trust modeling and evaluation for ad hoc networks

被引:6
|
作者
Sun, YL [1 ]
Yu, W
Han, Z
Liu, KJR
机构
[1] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20740 USA
关键词
ad hoc networks; security; trust modeling and evaluation;
D O I
10.1109/JSAC.2005.0861389
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The performance of ad hoe networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
引用
收藏
页码:305 / 317
页数:13
相关论文
共 50 条
  • [21] A trust enhanced secure clustering framework for wireless ad hoc networks
    Chatterjee, Pushpita
    Ghosh, Uttam
    Sengupta, Indranil
    Ghosh, Soumya K.
    WIRELESS NETWORKS, 2014, 20 (07) : 1669 - 1684
  • [22] A trust enhanced secure clustering framework for wireless ad hoc networks
    Pushpita Chatterjee
    Uttam Ghosh
    Indranil Sengupta
    Soumya K. Ghosh
    Wireless Networks, 2014, 20 : 1669 - 1684
  • [23] A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks
    Boodnah, Javesh
    Poslad, Stefan
    2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS, 2009, : 707 - 712
  • [24] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [25] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59
  • [26] Using context information to improve computation of trust in ad hoc networks
    Chung Tien Nguyen
    Camp, Olivier
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 619 - 624
  • [27] Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1001 - 1012
  • [28] Trust in mobile Ad Hoc Networks
    Veeraraghavan, Prakash
    Limaye, Vikram
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 330 - 334
  • [29] Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks
    Zhou, Nianjun
    Abouzeid, Alhussein A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (10) : 4608 - 4625
  • [30] An information theoretic approach to cluster head selection in mobile ad hoc networks
    Koshy, P
    Raghavan, SV
    Mobile and Wireless Communications Networks, 2003, : 120 - 123