Trust and reputation based approaches in ad hoc networks

In the mobile ad hoc network, if a mobile node wants to communicate with another node that is far away from the node, it relies on the intermediate node to relay the packets. There is a high probability for these intermediate nodes to be malicious. Therefore, the development of trust and reputation systems becomes necessary to find out the trusted intermediate node to forward the packet. Trust represents a node’s belief in the trust qualities of a peer, whereas reputation is the knowledge that peers have about other nodes in the network. There are several trust and reputation based schemes were suggested in ad hoc routing to ensure secure routing. The recommendation is an effective approach used to calculate the trust and reputation value. The application of trust management includes authentication, various aspects of communications like secure routing, intrusion detection key management, and data access control. Trust establishment, trust update, and trust revocation are the three major components of trust management system. Payment system rewards the nodes that forward other’s packets and charges those that send packets. The trust system estimates the node’s genuineness in forwarding packets in terms of multi-dimensional trust values.

Solution in NS2

  • In NS2, each node is assigned a trust variable. Most commonly used trust value lies between 0 and 1.

  • Trust value is assigned based on the behavior of the node. The behavior of the node is observed by the neighbor node based on the packet forwarding rate of each node in the routing.

  • Packet drop and no active participation in packet forwarding reduce the trust of the node. Reduced trust value nodes are not selected as routers in packet forwarding.

  • Trust based routing provides a considerable amount of performance efficiency in terms of the packet delivery ratio, throughput, end to end delay and packet loss when compared routing without trust.

  • In Intrusion Detection Systems (IDS), reputation metric is assigned to each node in the network.

  • Since Reputation is based on the behavior, the attacker is punished and their Reputation is reduced

  • As IDS is facilitated with the nodes based on the reputation value, selfish nodes are encouraged to behave well in the network operations.

Related Project Titles:

  • Mohamed M. E. A. Mahmou1, Xiaodong Lin, and Xuemin (Sherman) Shen1 “Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013.

  • Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1, JANUARY-FEBRUARY 2011.