We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Ad-hoc Network Secured via Trust Computing

by Rashmi Singh, Sudhir Dawra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 18
Year of Publication: 2015
Authors: Rashmi Singh, Sudhir Dawra
10.5120/ijca2015906715

Rashmi Singh, Sudhir Dawra . Ad-hoc Network Secured via Trust Computing. International Journal of Computer Applications. 128, 18 ( October 2015), 14-18. DOI=10.5120/ijca2015906715

@article{ 10.5120/ijca2015906715,
author = { Rashmi Singh, Sudhir Dawra },
title = { Ad-hoc Network Secured via Trust Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 18 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number18/22973-2015906715/ },
doi = { 10.5120/ijca2015906715 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:02.406452+05:30
%A Rashmi Singh
%A Sudhir Dawra
%T Ad-hoc Network Secured via Trust Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 18
%P 14-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad hoc network consist of a collection of wireless nodes, all of which may be mobile, dynamically creates a wireless network topology amongst them without using any fixed infrastructure. Nodes communicate with each other by passing data and control packet from one node to another. The execution and survival of an Ad-hoc network is rely upon the co-operative and trusting nature of its nodes. Ad-hoc network are vulnerable to passive and active attacks by malicious nodes due to the independent movement of nodes. Several protocols have been developed to secure Ad-hoc networks using cryptographic schemes, but all dependent on the existence of central trust authority. The presence of central trust authority is an impractical requirement for Ad-hoc networks, so in this Paper we present a trust model that doesn’t rely on central trust authority. In our model we make use of trust agents that reside on network nodes. Each agent operates independently and maintains its individual trust value. An agent gathers data from all events & assigns weights to each event and computes different trust levels based upon them. Each trust agent basically performs the three functions: Trust Derivation, Quantification, and Computation.

References
  1. Z. Zhou, Z.J. Haas, Securing ad hoc networks, IEEE Network 13 (1999), no. 6, 24–30.
  2. L. Zhou and Z. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Nov. 1999.
  3. Asad Amir Pirzada and Chris McDonald, ”Establishing Trust In Pure Ad-hoc Networks”
  4. M. J. Probst and S. K. Kasera, “Statistical trust establishment in wireless sensor networks,” in Proceedings of the 13th International Conference on Parallel and Distributed Systems, pp. 1–8, 2007.
  5. A. A. Pirzada and C. McDonald, “Trust establishment in pure ad-hoc networks,” Wireless Personal Communications, vol. 37(1-2), pp. 139–168, 2006.
  6. L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust in peer-to-peer communities,” IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, vol. 16, no. 7, pp. 843–857, July 2004.
  7. P. B. Velloso, R. P. Laufer, D. O. Cunha, O. C. M. B. Duarte and G. Pujolle1, “Trust management in mobile ad hoc networks using a scalable maturity-based model,” IEEE Trans. Netw. Service Manag., vol. 7, no. 3, pp. 172–185, Sep. 2010.
  8. G. Theodorakopoulos and J. S. Baras, “On trust models and trust evaluation metrics for ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318–328, February 2006.
  9. Z. Liu, A. W. Joy, and R. A. Thompson, “A dynamic trust model for mobile ad hoc networks,” in IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS’04, pp. 80–85, May 2004.
  10. S. S. Park, J. H. Lee, and T. M. Chung, “Cluster-based trust model against attacks in ad-hoc networks,” in Third International Conference on Convergence and Hybrid Information Technology, pp. 526–532, 2008.
  11. Y. Ren and A. Boukerche, “Modeling and managing the trust for wireless and mobile ad hoc networks,” in IEEE International Conference on Communications, ICC ’08, pp. 2129 – 2133, 19-23 May 2008.
  12. R. A. Shaikh, H. Jameel, S. Lee, S. Rajput and Y. J. Song, “Trust management problem in distributed wireless sensor networks,” in 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 411–414, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

AODV Trust Security Ad-hoc Networks Protocols