Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

Research Article

On Trust Evaluation in Mobile Ad Hoc Networks

Download115 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-04434-2_1,
        author={Dang Nguyen and Louise Lamont and Peter Mason},
        title={On Trust Evaluation in Mobile Ad Hoc Networks},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Ad hoc networks security trust evaluation connectivity},
        doi={10.1007/978-3-642-04434-2_1}
    }
    
  • Dang Nguyen
    Louise Lamont
    Peter Mason
    Year: 2012
    On Trust Evaluation in Mobile Ad Hoc Networks
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-04434-2_1
Dang Nguyen1,*, Louise Lamont1,*, Peter Mason2,*
  • 1: Communications Research Centre
  • 2: Defence Research & Development
*Contact email: Dang.Nguyen@crc.gc.ca, Louise.Lamont@crc.gc.ca, Peter.Mason@drdc-rddc.gc.ca

Abstract

           has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of  can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.