Trust and recommendations in mobile ad hoc networks

Venkat Balakrishnan*, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

23 Citations (Scopus)
31 Downloads (Pure)

Abstract

Recently several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. In these models, recommendations are circulated by forwarding explicit messages or introducing extra message headers. Apart from incurring additional overhead, the recommendations are prone to issues such as recommender's bias, honest-elicitation, and free-riding. In this paper, we propose a trust model to enhance the security of mobile ad hoc networks and to address the issues related to recommendations. The model uses only trusted routes for communication, and isolates malicious nodes depending on the evidence collected from direct interactions and recommendations. It deploys a novel approach for communicating recommendations such that they are free from recommender's bias, honest-elicitation, and free-riding. Simulation results confirm the effectiveness of our model.

Original languageEnglish
Title of host publication3rd International Conference on Networking and Services, ICNS 2007
EditorsGunter Van de Velde, Petre Dini, Mario Freire, Athanassios Liakopoulos, Ciprian Popoviciu, Dimitra Simeonidou, Petros Zerfos
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-6
Number of pages6
ISBN (Print)9780769528589
DOIs
Publication statusPublished - 2007
Event3rd International Conference on Networking and Services, ICNS 2007 - Athens, Greece
Duration: 19 Jun 200725 Jun 2007

Other

Other3rd International Conference on Networking and Services, ICNS 2007
CountryGreece
CityAthens
Period19/06/0725/06/07

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of the 3rd International Conference on Networking and Services ICNS 2007. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint Dive into the research topics of 'Trust and recommendations in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this