International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 128 - Number 18 |
Year of Publication: 2015 |
Authors: Rashmi Singh, Sudhir Dawra |
10.5120/ijca2015906715 |
Rashmi Singh, Sudhir Dawra . Ad-hoc Network Secured via Trust Computing. International Journal of Computer Applications. 128, 18 ( October 2015), 14-18. DOI=10.5120/ijca2015906715
Ad hoc network consist of a collection of wireless nodes, all of which may be mobile, dynamically creates a wireless network topology amongst them without using any fixed infrastructure. Nodes communicate with each other by passing data and control packet from one node to another. The execution and survival of an Ad-hoc network is rely upon the co-operative and trusting nature of its nodes. Ad-hoc network are vulnerable to passive and active attacks by malicious nodes due to the independent movement of nodes. Several protocols have been developed to secure Ad-hoc networks using cryptographic schemes, but all dependent on the existence of central trust authority. The presence of central trust authority is an impractical requirement for Ad-hoc networks, so in this Paper we present a trust model that doesn’t rely on central trust authority. In our model we make use of trust agents that reside on network nodes. Each agent operates independently and maintains its individual trust value. An agent gathers data from all events & assigns weights to each event and computes different trust levels based upon them. Each trust agent basically performs the three functions: Trust Derivation, Quantification, and Computation.