True: A Trust Evaluation Service for Mobile Ad Hoc Networks Resistant to Malicious Attacks

نویسندگان

  • Eduardo da Silva
  • Mehran Misaghi
  • Luiz Carlos Pessoa Albini
چکیده

Trust evaluation is an essential service to ensure reliability on security relationships on networks, including Mobile Ad Hoc Networks (MANETs). However, the implementation of an effective trust evaluation service is very difficult in these networks, due to their dynamic characteristics. Though many trust evaluation services for MANETs can be found in the literature, they were not designed considering malicious attacks or were not evaluated under these attacks. This work presents TRUE, a distributed trust evaluation service for MANETs which creates a self-organized context-based trust network. To estimate the trustworthiness of other nodes, nodes form trust chains based on behavior evidences maintained within the context-based trust network. Periodically, nodes exchange trust information with the neighbors, providing an efficient method to disseminate these information through the network. Simulation results show that TRUE is very efficient on gathering evidences to build the trust networks, maintaining a small communication and memory overhead. Further, it is the first trust evaluation scheme evaluated under bad mouthing and newcomers attacks and it maintains its effectiveness in such scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their n...

متن کامل

Trusting the Trust-Model in mobile wireless ad-hoc network settings

Nowadays, the world gets more and more mobile in such a way that communication services are desirable anytime and anywhere. In this context, Mobile wireless ad-hoc networks, including mobile ad-hoc networks (MANETs) and Mesh-Networks, are systems of nodes that interconnect in a dynamical self-organized way providing an attraction especially during mission-crucial or time-crucial applications, f...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Trust management in mobile ad hoc networks for bias minimization and application performance maximization

Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximizatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDIM

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2012