Abstract
MANET (Mobile Ad-hoc Network) is a structureless & dynamics network, which consist of mobile nodes without any physical link between them. MANET provides some basic functions like routing, communication, network management and packet forwarding etc over self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and leaves the network within a random period of time. It effects energy, bandwidth and memory computations of network. Providing trust in MANET is such a crucial task because it doesn’t having centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with their unique features, merits and demerits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Capra, L.: Toward a Human Trust Model for Mobile Ad-hoc Network. In: Proc. 2nd UK-UbiNet Workshop, May 5-7. Cambridge University, Cambridge (2004)
Jøsang, A., Presti, S.L.: Analyzing the Relationship between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)
Golbeck, J.: Computing with Trust: Definition, Properties and Algorithm. In: Securecomm and Workshops- Security and Privacy for Emerging Areas in Communication Networks, Baltimore, MD, August 28-September 1, pp. 1–7 (2006)
Theodorakopoulos, G., Baras, J.S.: On Trust Models and Trust Evaluation Metrics for Ad-hoc Networks. IEEE Journal on selected Areas in Communications 24(2), 318–328 (2006)
Boukerche, A., Ren, Y.: A Security Management Scheme using a novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks. In: Proc. Int’l. Workshop on Modeling Analysis and Simulation of Wireless and Mobile System, Vancouver, British Columbia, Canada, pp. 88–95 (2008)
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A Survey of Trust and Reputation Management System in Wireless Communications. In: Proc. of the IEEE (2010)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: ACM MobiCom Conference (2000)
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confident protocol “(cooperation of nodes: fairness in dynamic ad-hoc networks)”. In: IEEE/ACM Symposium on Mobile Ad-hoc Networking and Computing, MobiHoc 2002 (2002)
Michirardi, P., Molva, R.: Core: A collaborative reputation mechanism to encode node cooperation in mobile ad-hoc networks. In: CMS 2002 Communication and Multimedia Security Conference (2002)
Bansal, S., Baker, M.: Observation –based Cooperation Enforcement in Ad-hoc Networks, arxiv:cs/0307012v2 (2003)
He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation- based Incentive Schemes for Ad-hoc Networks. In: WCNC 2004 IEEE wireless Communications and Networking Conference (2004)
Hu, J., Burnmester, M.: LARS: a locally aware reputation system for mobile ad-hoc networks. In: 44th Annual ACM Southeast Regional Conference (2006)
Chen, A., Xu, G., Yang, Y.: A Cluster Based Trust Model For Mobile Ad-hoc Networks. IEEE (2008)
Cramp, R.: Logical foundations of probability. University of Chicago press (1950)
Cramp, R.: Replies and systematic expositions. In: Schilpp, P.A. (ed.) The Philosophy of Rudolf Carnap, pp. 966–998. Open court, La Salle (1963)
Velloso, P.B., Laufer, R.P., Cunha, D.d.O., Duarte, O.C.M.B., Pujolle, G.: Trust Management In Mobile Ad hoc Networks Using a Scalable Maturity Based Model. IEEE Transactions on Networks and Service Management 7(3), 172–185 (2010)
Virendra, M., Chanddrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proc. IEEE International Conf. Integration Knowledge Intensive Multi-Agent Syst., Waltham, USA (April 2005)
Theodorakopouls, G., Baras, J.S.: Trust Evaluation in ad-hoc networks. In: ACM Workshop Wireless Security (October 2004)
Saxena, N., Tsudik, G., Yi, J.H.: Threshold Cryptography in P2P and MANETs: the case of access control. Computer Networks 51(12), 3632–3649 (2007)
Wu, B., Wu, J., Fernadez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in Mobile ad hoc networks. Journal of Network Computer Applications 30(3), 937–954 (2007)
Joshi, D., Namuduri, K., Pendse, R.: Secure, redundant, and fully distributed ket management scheme in mobile and ad- hoc networks: an analysis. EURASIP Journal on Wireless Communications and Networking (4), 579–589 (2005)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public key management for mobile ad-hoc networks. Mobile Computing and Communication Review 6(4) (2002)
Caballero-Gill, P., Herandez-Goya, C.: Efficient Public Key Certificate Management for Mobile Ad Hoc Networks. EURASIP Journal on Wireless Communications and Networking 2011, 1–10 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dalal, R., Khari, M., Singh, Y. (2012). Survey of Trust Schemes on Ad-Hoc Network. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-27299-8_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27298-1
Online ISBN: 978-3-642-27299-8
eBook Packages: Computer ScienceComputer Science (R0)