Peer Trust in Mobile Ad-hoc Communities

نویسندگان

  • Sye Loong Keoh
  • Emil Lupu
چکیده

An ad-hoc network is perceived as a community of autonomous devices that interconnect, interact and collaborate with each other. Ad-hoc networks have dynamic topologies and cannot rely on a continuous connection to the Internet. This introduces difficult security issues when attempting to provide authentication, membership management and access control. Thus, the users have to rely on other peers in the community to relay or provide security information in the form of assertions. We term this as peer trust. In this paper, we propose a policy-based approach to regulate the behaviour of users by explicitly defining the required policies for an ad-hoc community. A community specification, namely doctrine, defines a set of participants in terms of roles, the user-role assignment (URA) policies, authorisation and obligation policies, as well as constraint specifications. However, enforcing the policies itself is a challenging task and this paper describes the conditions under which peer trust can be used to perform authentication as well as to assist the enforcement of policies, in particular the URA policies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Trust Establishment in MANET’s: Swarm Intelligence

We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We present a framework for trust establishment in mobile ad-hoc networks and argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc netw...

متن کامل

On Trust Establishment in Mobile Ad-Hoc Networks

We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to...

متن کامل

Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks

Trust recommendations, having a pivotal role in computation of trust and hence confidence in peer to peer (P2P) environment, if hampered, may entail in colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation of dishonest trust recommendations is stipulated as a challenging research issue in P2P systems (esp in Mobile Ad Hoc N...

متن کامل

cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks

In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional peer-to-peer (P2P) systems, trust management in MANETs is based on simple neighbor trust relationships and also location and time dependent. In this paper, we foc...

متن کامل

Efficient Quality Trust Based Routing Algorithm to Enhance Security in Manet

A mobile ad-hoc network (MANET) is a peer-to peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations, these networks are self-configuring. In this paper, a new algorithm is proposed to calculate the trust and QoS metric estimation into establishing a trustbased QoS model. In this model, the estimate the trust deg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004