Skip to main content

Abstract

MANET (Mobile Ad-hoc Network) is a structureless & dynamics network, which consist of mobile nodes without any physical link between them. MANET provides some basic functions like routing, communication, network management and packet forwarding etc over self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and leaves the network within a random period of time. It effects energy, bandwidth and memory computations of network. Providing trust in MANET is such a crucial task because it doesn’t having centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with their unique features, merits and demerits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Capra, L.: Toward a Human Trust Model for Mobile Ad-hoc Network. In: Proc. 2nd UK-UbiNet Workshop, May 5-7. Cambridge University, Cambridge (2004)

    Google Scholar 

  2. Jøsang, A., Presti, S.L.: Analyzing the Relationship between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Golbeck, J.: Computing with Trust: Definition, Properties and Algorithm. In: Securecomm and Workshops- Security and Privacy for Emerging Areas in Communication Networks, Baltimore, MD, August 28-September 1, pp. 1–7 (2006)

    Google Scholar 

  4. Theodorakopoulos, G., Baras, J.S.: On Trust Models and Trust Evaluation Metrics for Ad-hoc Networks. IEEE Journal on selected Areas in Communications 24(2), 318–328 (2006)

    Article  Google Scholar 

  5. Boukerche, A., Ren, Y.: A Security Management Scheme using a novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks. In: Proc. Int’l. Workshop on Modeling Analysis and Simulation of Wireless and Mobile System, Vancouver, British Columbia, Canada, pp. 88–95 (2008)

    Google Scholar 

  6. Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A Survey of Trust and Reputation Management System in Wireless Communications. In: Proc. of the IEEE (2010)

    Google Scholar 

  7. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: ACM MobiCom Conference (2000)

    Google Scholar 

  8. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confident protocol “(cooperation of nodes: fairness in dynamic ad-hoc networks)”. In: IEEE/ACM Symposium on Mobile Ad-hoc Networking and Computing, MobiHoc 2002 (2002)

    Google Scholar 

  9. Michirardi, P., Molva, R.: Core: A collaborative reputation mechanism to encode node cooperation in mobile ad-hoc networks. In: CMS 2002 Communication and Multimedia Security Conference (2002)

    Google Scholar 

  10. Bansal, S., Baker, M.: Observation –based Cooperation Enforcement in Ad-hoc Networks, arxiv:cs/0307012v2 (2003)

    Google Scholar 

  11. He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation- based Incentive Schemes for Ad-hoc Networks. In: WCNC 2004 IEEE wireless Communications and Networking Conference (2004)

    Google Scholar 

  12. Hu, J., Burnmester, M.: LARS: a locally aware reputation system for mobile ad-hoc networks. In: 44th Annual ACM Southeast Regional Conference (2006)

    Google Scholar 

  13. Chen, A., Xu, G., Yang, Y.: A Cluster Based Trust Model For Mobile Ad-hoc Networks. IEEE (2008)

    Google Scholar 

  14. Cramp, R.: Logical foundations of probability. University of Chicago press (1950)

    Google Scholar 

  15. Cramp, R.: Replies and systematic expositions. In: Schilpp, P.A. (ed.) The Philosophy of Rudolf Carnap, pp. 966–998. Open court, La Salle (1963)

    Google Scholar 

  16. Velloso, P.B., Laufer, R.P., Cunha, D.d.O., Duarte, O.C.M.B., Pujolle, G.: Trust Management In Mobile Ad hoc Networks Using a Scalable Maturity Based Model. IEEE Transactions on Networks and Service Management 7(3), 172–185 (2010)

    Article  Google Scholar 

  17. Virendra, M., Chanddrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proc. IEEE International Conf. Integration Knowledge Intensive Multi-Agent Syst., Waltham, USA (April 2005)

    Google Scholar 

  18. Theodorakopouls, G., Baras, J.S.: Trust Evaluation in ad-hoc networks. In: ACM Workshop Wireless Security (October 2004)

    Google Scholar 

  19. Saxena, N., Tsudik, G., Yi, J.H.: Threshold Cryptography in P2P and MANETs: the case of access control. Computer Networks 51(12), 3632–3649 (2007)

    Article  MATH  Google Scholar 

  20. Wu, B., Wu, J., Fernadez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in Mobile ad hoc networks. Journal of Network Computer Applications 30(3), 937–954 (2007)

    Article  Google Scholar 

  21. Joshi, D., Namuduri, K., Pendse, R.: Secure, redundant, and fully distributed ket management scheme in mobile and ad- hoc networks: an analysis. EURASIP Journal on Wireless Communications and Networking (4), 579–589 (2005)

    Google Scholar 

  22. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public key management for mobile ad-hoc networks. Mobile Computing and Communication Review 6(4) (2002)

    Google Scholar 

  23. Caballero-Gill, P., Herandez-Goya, C.: Efficient Public Key Certificate Management for Mobile Ad Hoc Networks. EURASIP Journal on Wireless Communications and Networking 2011, 1–10 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dalal, R., Khari, M., Singh, Y. (2012). Survey of Trust Schemes on Ad-Hoc Network. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27299-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27298-1

  • Online ISBN: 978-3-642-27299-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics