SlideShare a Scribd company logo
1 of 46
Introduction
                        System Model
                             Refrences




          Distributed Self-organized
       Trust Management for MANETs

         Mehran Misaghi1 Eduardo da Silva2,3
                Luiz Carlos P. Albini3
  1 Research   Department - Educational Society of Santa Catarina
                       mehran@sociesc.org.br
    2 Department     of Informatics - Catarinense Federal Institute
                           eduardos@inf.ufpr.br
    3 Department     of Informatics - Federal University of Parana
                             albini@inf.ufpr.br


                             April 20, 2012

Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                   System Model     Concepts
                                        Refrences


Introduction

  Security
    1   One of the most challenging issues for MANETs [WCWC06]:
             High vulnerability in security threats due to wireless
             communication and dynamic topology
             Adversaries can easly perfom attacks via wireless
             communcation channel
             Difficulty in implementation of security applications
    2   Cryptography is the main technique used to ensure data
        communication security
             It does not provide information about the reliability of the
             nodes [LSY05]
             Key management relies on some degree of pre-established trust
             between nodes
             Trust is very difficult to be valued [BFL96]


           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                   System Model     Concepts
                                        Refrences


Introduction

  Security
    1   One of the most challenging issues for MANETs [WCWC06]:
             High vulnerability in security threats due to wireless
             communication and dynamic topology
             Adversaries can easly perfom attacks via wireless
             communcation channel
             Difficulty in implementation of security applications
    2   Cryptography is the main technique used to ensure data
        communication security
             It does not provide information about the reliability of the
             nodes [LSY05]
             Key management relies on some degree of pre-established trust
             between nodes
             Trust is very difficult to be valued [BFL96]


           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                 System Model     Concepts
                                      Refrences


Trust Concepts I


  Trust
  Can be defined as the trustworthiness of a trustor, or how much it
  is willing to take the risk of trust, in a trustee [Bus02]

  Trust management can be used in
      Support in decisions as intrusion detection [ACP+ 02]
      Authentication [GPM05]
      Access control [LKZ+ 04]
      Isolation of misbehaving nodes for effective routing [MGLB00]




         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                 System Model     Concepts
                                      Refrences


Trust Concepts I


  Trust
  Can be defined as the trustworthiness of a trustor, or how much it
  is willing to take the risk of trust, in a trustee [Bus02]

  Trust management can be used in
      Support in decisions as intrusion detection [ACP+ 02]
      Authentication [GPM05]
      Access control [LKZ+ 04]
      Isolation of misbehaving nodes for effective routing [MGLB00]




         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                     System Model     Concepts
                                          Refrences


Trust Concepts II

  In MANETs
      Routing strategies, distributed storage,
      location management, and key management or establishment

  Trust evaluation schemes
      Support and maintain trust evidences of nodes
      Ant-Based Evidence Distribution (ABED) proposed by [JB04]:

         1     Nodes interact with each other through agents (“ants”)
         2     Nodes are able to identify an optimal path to accumulate trust
               evidence
         3     Such a scheme was not evaluated under any type of attack


             Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                     System Model     Concepts
                                          Refrences


Trust Concepts II

  In MANETs
      Routing strategies, distributed storage,
      location management, and key management or establishment

  Trust evaluation schemes
      Support and maintain trust evidences of nodes
      Ant-Based Evidence Distribution (ABED) proposed by [JB04]:

         1     Nodes interact with each other through agents (“ants”)
         2     Nodes are able to identify an optimal path to accumulate trust
               evidence
         3     Such a scheme was not evaluated under any type of attack


             Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                 System Model     Concepts
                                      Refrences


Trust Evaluation Schemes I


  self-organizing trust-based Physical-Logical Domains
  Concept for Grouping nodes and support for distributed control in
  the newtwork [VJCU05]:
      A security architecture which uses trust to establish keys
      between nodes
      Establish secure distributed control in MANETs
      Nodes use trust information to form groups and to establish
      pair-wise key in the groups
      Suitable just for establishing group keys
      The scheme was not evaluated under attacks



         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Trust Evaluation Schemes - Utilities



      support secure authentication for MANETs [CKLW09]
      SORI uses cooperation incentive based on
      reputation [HWK04]:
        1     stimulating packet forwarding and disciplining selfish nodes
              through punishments
        2     Nodes are able to identify an optimal path to accumulate trust
              evidence
        3     The reputation of a node is calculated using objective metrics
        4     The implementation of SORI to support other applications is
              very difficult




            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Trust Evaluation Schemes - Utilities



      support secure authentication for MANETs [CKLW09]
      SORI uses cooperation incentive based on
      reputation [HWK04]:
        1     stimulating packet forwarding and disciplining selfish nodes
              through punishments
        2     Nodes are able to identify an optimal path to accumulate trust
              evidence
        3     The reputation of a node is calculated using objective metrics
        4     The implementation of SORI to support other applications is
              very difficult




            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                 System Model     Concepts
                                      Refrences


Trust Evaluation Schemes II

  Trust Models
  Model of [VLDP08]:
      Resistant to slander attacks, a variance of the bad mouthing
      ones
      Provides nodes with a mechanism to build a trust relationship
      with their neighbors
      Not suitable for applications that require trust information of
      nodes out of the radio range
  Model of [SHYL06]
      This model considers malicious attacks
      Secure routing operations and detect malicious nodes


         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                 System Model     Concepts
                                      Refrences


Trust Evaluation Schemes II

  Trust Models
  Model of [VLDP08]:
      Resistant to slander attacks, a variance of the bad mouthing
      ones
      Provides nodes with a mechanism to build a trust relationship
      with their neighbors
      Not suitable for applications that require trust information of
      nodes out of the radio range
  Model of [SHYL06]
      This model considers malicious attacks
      Secure routing operations and detect malicious nodes


         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                System Model     Concepts
                                     Refrences




Trust Evaluation Schemes - Summary
 1   The most os schemes were not evaluated under misbehavior
     attacks
 2   The use of a non-secure trust evaluation scheme can harm the
     entire seure solution of system
 3   The schemes that consider the presence of malicious nodes
     are limited to one network operation (routing)




        Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Our work


  Our scheme
      A trust evaluation scheme for MANETs:
        1     To support any application
        2     Resistant to misbehavior attacks
      In this scheme:
        1     Each node creates a virtual layer to support trust information
        2     Virtual layer (trust network) contains all trust informations
        3     Such informations are gathered via recommendation or direct
              interaction
        4     Trustworthiness of node is locally computed (Trust network of
              the node)




            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Our work


  Our scheme
      A trust evaluation scheme for MANETs:
        1     To support any application
        2     Resistant to misbehavior attacks
      In this scheme:
        1     Each node creates a virtual layer to support trust information
        2     Virtual layer (trust network) contains all trust informations
        3     Such informations are gathered via recommendation or direct
              interaction
        4     Trustworthiness of node is locally computed (Trust network of
              the node)




            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Our scheme evaluation

  scenarios
      Two kinds of attacks:
        1     Bad mouthing: consist of malicious nodes providing dishonest
              trust evidences to defame good nodes or enhance trust values
              of bad ones [Del00].
        2     Newcomer (Sybil): consist of a malicious node registering a
              new identity and assigning high trust values to it.
      Simulations with NS:
        1     Proposed scheme is robust and efficient
        2     Trust evidences are quickly disseminated through the network
        3     Nodes are able to effectively estimate the trustworthiness of
              other nodes
        4     Proposed scheme is resistant to false accusation attacks


            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                    System Model     Concepts
                                         Refrences


Our scheme evaluation

  scenarios
      Two kinds of attacks:
        1     Bad mouthing: consist of malicious nodes providing dishonest
              trust evidences to defame good nodes or enhance trust values
              of bad ones [Del00].
        2     Newcomer (Sybil): consist of a malicious node registering a
              new identity and assigning high trust values to it.
      Simulations with NS:
        1     Proposed scheme is robust and efficient
        2     Trust evidences are quickly disseminated through the network
        3     Nodes are able to effectively estimate the trustworthiness of
              other nodes
        4     Proposed scheme is resistant to false accusation attacks


            Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                Trust chain
                               System Model
                                                NS - Evaluation
                                    Refrences




Our scheme
    The scheme focuses on self-organized mobile ad hoc network
    Consist of a set of n nodes without losing generality
    Such nodes are considered to have similar functionalities
    Such nodes contribute to network operations and maintenance




       Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                 Trust chain
                                System Model
                                                 NS - Evaluation
                                     Refrences


Example of Trust Evaluation




        Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                       Trust chain
                                  System Model
                                                       NS - Evaluation
                                       Refrences


Calculation Trust Value (TV )

  After calculating the trust value for all chains, the trust value
  TV(nx ,nu ) can be calculated applying a weighted mean, as follows:
                                      k
                                              i                i
                                           (TC(nx ,nu ) × 1/|TC(nx ,nu ) |)
                                     i=1
                 TV(nx ,nu ) =                     k
                                                                                                   (1)
                                                               1
                                                            i
                                                         |TC(nx ,nu ) |
                                                   i=1


  weighted mean
  The weighted mean reduces the impact of transitivity in trust
  chains. This method aims to privilege small chains, following a
  social perspective.

          Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                       Trust chain
                                  System Model
                                                       NS - Evaluation
                                       Refrences


Calculation Trust Value (TV )

  After calculating the trust value for all chains, the trust value
  TV(nx ,nu ) can be calculated applying a weighted mean, as follows:
                                      k
                                              i                i
                                           (TC(nx ,nu ) × 1/|TC(nx ,nu ) |)
                                     i=1
                 TV(nx ,nu ) =                     k
                                                                                                   (1)
                                                               1
                                                            i
                                                         |TC(nx ,nu ) |
                                                   i=1


  weighted mean
  The weighted mean reduces the impact of transitivity in trust
  chains. This method aims to privilege small chains, following a
  social perspective.

          Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                  Trust chain
                                 System Model
                                                  NS - Evaluation
                                      Refrences


Evalaution tool and scenario


  Evaluation with NS 2.34
      Used for evaluate the performance and effectiveness of the
      proposed trust management scheme.
      Simulations were made with honest and malicious nodes.
      100 nodes use the IEEE 802.11 with DCF as MAC protocol.
      Nodes move on an area of 1000m x 1000m, in random
      waypoint model (20 m/s) with 20s pause time.
      Total time of simulations is 2000s.
      Avarage of 35 simulations with 95% confidence interval




         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios without Attackers
  Estimated trust values without attackers


                     0.9
                                                                                                  0.6
                     0.8

                     0.7                                                                          0.5




                                                                           Average Trust Values
                     0.6                                                                          0.4
                     0.5
                                                                                                  0.3
                 β




                     0.4

                     0.3                                                                          0.2

                     0.2
                                                                                                  0.1
                     0.1
                                                                                                  0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios without Attackers
  Reliable nodes without attackers


                     0.9
                                                                                                   100
                     0.8
                                                                                                   90
                     0.7
                                                                                                   80




                                                                           Trust Nodes Scale (%)
                     0.6                                                                           70
                     0.5                                                                           60
                 β




                     0.4                                                                           50

                     0.3                                                                           40

                     0.2                                                                           30
                                                                                                   20
                     0.1
                                                                                                   10
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                  Trust chain
                                 System Model
                                                  NS - Evaluation
                                      Refrences


Scenarios without Attackers
  Time to disseminate trust evidences and percentage of nodes in
  trust graphs

                     α          Time (sec.)             Nodes (%)
                    0.0           198.51                 100.00%
                    0.1           713.54                  99.99%
                    0.2           801.49                  99.96%
                    0.3           885.14                  99.92%
                    0.4           936.97                  99.35%
                    0.5           926.96                  96.94%
                    0.6           878.08                  92.57%
                    0.7           768.51                  78.98%
                    0.8           598.22                  50.37%
                    0.9           281.08                  17.34%

         Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under bad mouthing attack
  2% of attackers


                     0.9
                                                                                                20
                     0.8

                     0.7                                                                        16




                                                                           Affected Nodes (%)
                     0.6
                                                                                                12
                     0.5
                 β




                     0.4
                                                                                                8
                     0.3

                     0.2                                                                        4

                     0.1
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under bad mouthing attack
  5% of attackers


                     0.9
                                                                                                20
                     0.8

                     0.7                                                                        16




                                                                           Affected Nodes (%)
                     0.6
                                                                                                12
                     0.5
                 β




                     0.4
                                                                                                8
                     0.3

                     0.2                                                                        4

                     0.1
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under bad mouthing attack
  10% of attackers


                     0.9
                                                                                                16
                     0.8

                     0.7
                                                                                                12




                                                                           Affected Nodes (%)
                     0.6

                     0.5
                                                                                                8
                 β




                     0.4

                     0.3
                                                                                                4
                     0.2

                     0.1
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                  System Model
                                                      NS - Evaluation
                                       Refrences


Scenarios under bad mouthing attack
  Trust variation in scenarios under attack

                       β                           Attackers
                                   2%                 5%                 10%
                      0.0         0.0055             0.0116             0.0158
                      0.1         0.0271             0.0503             0.0671
                      0.2         0.0365             0.0655             0.0868
                      0.3         0.0432             0.0803             0.1045
                      0.4         0.0561             0.0987             0.1290
                      0.5         0.0884             0.1355             0.1700
                      0.6         0.1619             0.2081             0.2390
                      0.7         0.3258             0.3403             0.3574
                      0.8         0.4300             0.4403             0.4339
                      0.9         0.2829             0.3277             0.3377

          Mehran Misaghi - mehran@sociesc.org.br      Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under newcomer attack
  2% of attackers


                     0.9
                                                                                                100
                     0.8
                                                                                                90
                     0.7                                                                        80




                                                                           Affected Nodes (%)
                     0.6                                                                        70
                                                                                                60
                     0.5
                                                                                                50
                 β




                     0.4
                                                                                                40
                     0.3                                                                        30
                     0.2                                                                        20

                     0.1                                                                        10
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under newcomer attack
  5% of attackers


                     0.9
                                                                                                100
                     0.8
                                                                                                90
                     0.7                                                                        80




                                                                           Affected Nodes (%)
                     0.6                                                                        70
                                                                                                60
                     0.5
                                                                                                50
                 β




                     0.4
                                                                                                40
                     0.3                                                                        30
                     0.2                                                                        20

                     0.1                                                                        10
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                      Trust chain
                                 System Model
                                                      NS - Evaluation
                                      Refrences


Scenarios under newcomer attack
  10% of attackers


                     0.9
                                                                                                100
                     0.8
                                                                                                90
                     0.7                                                                        80




                                                                           Affected Nodes (%)
                     0.6                                                                        70
                                                                                                60
                     0.5
                                                                                                50
                 β




                     0.4
                                                                                                40
                     0.3                                                                        30
                     0.2                                                                        20

                     0.1                                                                        10
                                                                                                0
                      0
                           0   0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

                                                  α

         Mehran Misaghi - mehran@sociesc.org.br       Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                                    Trust chain
                                   System Model
                                                    NS - Evaluation
                                        Refrences


Conclusions
  Existing Trust Management schemes
       No specific attack model was addressed nor evaluated
       on [BR08, MM02, BLB02, DJQ09].
        Some schemes are limited only to support routing
        strategies [MM02, BLB02, DJQ09].
        Support for other applications is very difficult in [HWK04].

  Our scheme
   1 The nodes create a virtual trust network.

    2   Contains trust information about other nodes.
    3   Each node estimates the trustworthiness of other nodes.
    4   Simulation results show the efficiency of our scheme.
    5   The scheme is able to resist up to 10% of attackers.
           Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                                         Trust chain
                        System Model
                                         NS - Evaluation
                             Refrences




          Distributed Self-organized
       Trust Management for MANETs

         Mehran Misaghi1 Eduardo da Silva2,3
                Luiz Carlos P. Albini3
  1 Research   Department - Educational Society of Santa Catarina
                       mehran@sociesc.org.br
    2 Department     of Informatics - Catarinense Federal Institute
                           eduardos@inf.ufpr.br
    3 Department     of Informatics - Federal University of Parana
                             albini@inf.ufpr.br


                             April 20, 2012

Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences


Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard
Jouga, Ludovic M´, and Ricardo Staciarini Puttini.
                  e
Security in ad hoc networks: a general intrusion detection
architecture enhancing trust based approaches.
In Proceedings of the 1st International Workshop on Wireless
Information Systems (WIS ’02), pages 1–12. ICEIS Press, April
2002.
Matt Blaze, Joan Feigenbaum, and Jack Lacy.
Decentralized trust management.
In Proceedings of the 1996 IEEE Symposium on Security and
Privacy (SP ’96), page 164. IEEE Computer Society, 1996.
Sonja Buchegger and Jean-Yves Le Boudec.
Performance analysis of the CONFIDANT protocol.
In Proceedings of the 3rd ACM international symposium on
Mobile ad hoc networking & computing (MobiHoc ’02), pages
226–236, New York, NY, USA, 2002. ACM.
   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences


Azzedine Boukerche and Yonglin Ren.
A security management scheme using a novel computational
reputation model for wireless and mobile ad hoc networks.
In Proceedings of the 5th ACM symposium on Performance
evaluation of wireless ad hoc, sensor, and ubiquitous networks
(PE-WASUN ’08), pages 88–95. ACM, 2008.
Vincent Buskens.
Social Networks and Trust.
Kluwer Academic Publishers, Dordrecht, The Netherlands,
2002.
Ben-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, and De-Yu
Wang.
Markov chain-based trust model for analyzing trust value in
distributed multicasting mobile ad hoc networks.
59:1846–1863, 2009.

   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences


Chrysanthos Dellarocas.
Mechanisms for coping with unfair ratings and discriminatory
behavior in online reputation reporting systems.
In Proceedings of the 21th International Conference on
Information Systems (ICIS ’00), pages 520–525, Atlanta, GA,
USA, 2000. Association for Information Systems.
Hongjun Dai, Zhiping Jia, and Zhiwei Qin.
Trust evaluation and dynamic routing decision based on fuzzy
theory for manets.
JSW – Journal of Software, 4(10):1091–1101, 2009.
Tirthankar Ghosh, Niki Pissinou, and Kami Makki.
Towards designing a trusted routing solution in mobile ad hoc
networks.
Mobile Networks and Applications, 10(6):985–995, 2005.
Q. He, D. Wu, and P. Khosla.
   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences

SORI: A secure and objective reputation-based incentive
scheme for ad-hoc networks.
In Proceedings of the 2004 IEEE Wireless Communications
and Networking Conference (WCNC ’04), pages 825–830.
IEEE Communications Society, 2004.
Tao Jiang and John S. Baras.
Ant-based adaptive trust evidence distribution in manet.
In Proceedings of the 24th International Conference on
Distributed Computing Systems Workshops(ICDCSW’04),
pages 588–593. IEEE Computer Society, 2004.
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia
Zhang.
Ursa: ubiquitous and robust access control for mobile ad hoc
networks.
IEEE/ACM Transaction on Networking (TON),
12(6):1049–1063, 2004.
   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences


Xia Li, Jill Slay, and Shaokai Yu.
Evaluating trust in mobile ad hoc networks.
In Proceedings of the 2005 Workshop of International
Conference on Computational Intelligence and Security (CIS
’05). Springer, 2005.
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker.
Mitigating routing misbehavior in mobile ad hoc networks.
In Proceedings of the 6th Annual International Conference on
Mobile Computing and Networking (MobiCom ’00), pages
255–265. ACM, 2000.
Pietro Michiardi and Refik Molva.
Core: a collaborative reputation mechanism to enforce node
cooperation in mobile ad hoc networks.
In Proceedings of the IFIP TC6/TC11 6th Joint Working
Conference on Communications and Multimedia Security,

   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences

pages 107–121, Deventer, The Netherlands, The Netherlands,
2002. Kluwer, B.V.
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu.
A trust evaluation framework in distributed networks:
Vulnerability analysis and defense against attacks.
In Proceedings of the 25th IEEE International Conference on
Computer Communications (INFOCOM ’06), pages 1–13.
IEEE Communications Society, 2006.
Mohit Virendra, Murtuza Jadliwala, Madhusudhanan Ch, and
Shambhu Upadhyaya.
Quantifying trust in mobile ad-hoc networks.
In Proceedings of the IEEE International Conference on
Integration of Knowledge Intensive Multi-Agent Systems
(KIMAS ’05, pages 65–71. IEEE Computer Society, 2005.
P. B. Velloso, R. P. Laufer, O.-C.M.B. Duarte, and G. Pujolle.
A trust model robust to slander attacks in ad hoc networks.
   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs
Introduction
                           System Model
                                Refrences

In Proceedings of 17th International Conference on Computer
Communications and Networks. (ICCCN ’08), pages 1–6. IEEE
Communications Society, 2008.
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei.
A survey on attacks and countermeasures in mobile ad hoc
networks, chapter 12, pages 103–136.
Springer-Verlag, New York, NY, USA, 2006.




   Mehran Misaghi - mehran@sociesc.org.br   Distributed Self-organized Trust Management for MANETs

More Related Content

What's hot

The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)IOSR Journals
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...IJNSA Journal
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
 
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...IJNSA Journal
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill ChainEMC
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionUvaraj Shan
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET Journal
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetIOSR Journals
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...IJNSA Journal
 

What's hot (17)

The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Vertualisation
VertualisationVertualisation
Vertualisation
 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill Chain
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
M026075079
M026075079M026075079
M026075079
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 

Viewers also liked

Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...
Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...
Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...Mehran Misaghi
 
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Mehran Misaghi
 
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemSegurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemMehran Misaghi
 
Refrence letter from Fraser
Refrence letter from FraserRefrence letter from Fraser
Refrence letter from FraserTom Watson
 
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEM
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEMSEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEM
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEMMehran Misaghi
 
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Mehran Misaghi
 
LEAN SOFTWARE DEVELOPMENT: A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...
LEAN SOFTWARE DEVELOPMENT:  A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...LEAN SOFTWARE DEVELOPMENT:  A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...
LEAN SOFTWARE DEVELOPMENT: A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...Mehran Misaghi
 
2 connective tissue neoplasms
2  connective tissue neoplasms2  connective tissue neoplasms
2 connective tissue neoplasmsTahani Alteen
 
LESSON PLAN IN KINDER SCIENCE
LESSON PLAN IN KINDER SCIENCELESSON PLAN IN KINDER SCIENCE
LESSON PLAN IN KINDER SCIENCEmaynabay_rona
 
Lesions of oral cavity
Lesions of oral cavityLesions of oral cavity
Lesions of oral cavityJoel Mathew
 
Sociological foundation of curriculum
Sociological foundation of curriculumSociological foundation of curriculum
Sociological foundation of curriculummarinelademesa
 
Philosophical and psychological foundations of curriculum
Philosophical and psychological foundations of curriculumPhilosophical and psychological foundations of curriculum
Philosophical and psychological foundations of curriculumgopikarchandran
 

Viewers also liked (16)

Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...
Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...
Aplicação de Um mecanismo infometrico num modelo de gestão de conhecimento co...
 
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
 
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemSegurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
 
Refrence letter from Fraser
Refrence letter from FraserRefrence letter from Fraser
Refrence letter from Fraser
 
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEM
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEMSEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEM
SEGURANÇA CIBERNÉTICA: DESAFIOS E OPORTUNIDADES NA ERA DE CIBERESPIONAGEM
 
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
 
LEAN SOFTWARE DEVELOPMENT: A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...
LEAN SOFTWARE DEVELOPMENT:  A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...LEAN SOFTWARE DEVELOPMENT:  A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...
LEAN SOFTWARE DEVELOPMENT: A CASE STUDY IN A MEDIUM-SIZED COMPANY IN BRAZILI...
 
2 connective tissue neoplasms
2  connective tissue neoplasms2  connective tissue neoplasms
2 connective tissue neoplasms
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
LESSON PLAN IN KINDER SCIENCE
LESSON PLAN IN KINDER SCIENCELESSON PLAN IN KINDER SCIENCE
LESSON PLAN IN KINDER SCIENCE
 
Oral ulcers(collection)
Oral ulcers(collection)Oral ulcers(collection)
Oral ulcers(collection)
 
Lesions of oral cavity
Lesions of oral cavityLesions of oral cavity
Lesions of oral cavity
 
Sociological foundation of curriculum
Sociological foundation of curriculumSociological foundation of curriculum
Sociological foundation of curriculum
 
Philosophical and psychological foundations of curriculum
Philosophical and psychological foundations of curriculumPhilosophical and psychological foundations of curriculum
Philosophical and psychological foundations of curriculum
 
White Lesions
White LesionsWhite Lesions
White Lesions
 
Oral cavity lesions
Oral cavity lesionsOral cavity lesions
Oral cavity lesions
 

Similar to Distributed Self-organized Trust Management for Mobile Ad Hoc Networks

A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling MethodologiesEC-Council
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPER
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPERWEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPER
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPERcscpconf
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSTRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSIAEME Publication
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS IAEME Publication
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...sunda2011
 
21 security and_trust
21 security and_trust21 security and_trust
21 security and_trustMajong DevJfu
 
Trust and reputation in mobile environments
Trust and reputation in mobile environmentsTrust and reputation in mobile environments
Trust and reputation in mobile environmentsAndrada Astefanoaie
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wirelessjpstudcorner
 
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...cyberprosocial
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksLogicMindtech Nologies
 
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsVulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsAhad
 
The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!Caroline Johnson
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 

Similar to Distributed Self-organized Trust Management for Mobile Ad Hoc Networks (20)

A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPER
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPERWEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPER
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPER
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSTRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
 
21 security and_trust
21 security and_trust21 security and_trust
21 security and_trust
 
Trust and reputation in mobile environments
Trust and reputation in mobile environmentsTrust and reputation in mobile environments
Trust and reputation in mobile environments
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wireless
 
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...
Analyzing Cyber Attacks 2023: Lessons Learned and Strategies for Safeguarding...
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsVulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
 
The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 

More from Mehran Misaghi

A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *
A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *
A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *Mehran Misaghi
 
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...Mehran Misaghi
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
 
Direcionadores de adoção e implantação de frameworks de TI nas organizações
Direcionadores de adoção e implantação de frameworks de TI nas organizaçõesDirecionadores de adoção e implantação de frameworks de TI nas organizações
Direcionadores de adoção e implantação de frameworks de TI nas organizaçõesMehran Misaghi
 
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Mehran Misaghi
 
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Mehran Misaghi
 
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemSegurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemMehran Misaghi
 

More from Mehran Misaghi (7)

A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *
A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *
A STEP-BY-STEP IMPLEMENTATION OF A CORPORATE SOCIAL NETWORK *
 
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...
UMA ANÁLISE BIBLIOMÉTRICA SOBRE A APLICAÇÃO DO PENSAMENTO ENXUTO NA ENGENHARI...
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
Direcionadores de adoção e implantação de frameworks de TI nas organizações
Direcionadores de adoção e implantação de frameworks de TI nas organizaçõesDirecionadores de adoção e implantação de frameworks de TI nas organizações
Direcionadores de adoção e implantação de frameworks de TI nas organizações
 
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...Proposta de software integrado ao Facebook para auxílio na preparação para o ...
Proposta de software integrado ao Facebook para auxílio na preparação para o ...
 
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
Redes Sociais Corporativas: Uma Proposta de Análise de Competências Como Ferr...
 
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagemSegurança cibernética: Desafios e oportunidades na era de ciberespionagem
Segurança cibernética: Desafios e oportunidades na era de ciberespionagem
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

Distributed Self-organized Trust Management for Mobile Ad Hoc Networks

  • 1. Introduction System Model Refrences Distributed Self-organized Trust Management for MANETs Mehran Misaghi1 Eduardo da Silva2,3 Luiz Carlos P. Albini3 1 Research Department - Educational Society of Santa Catarina mehran@sociesc.org.br 2 Department of Informatics - Catarinense Federal Institute eduardos@inf.ufpr.br 3 Department of Informatics - Federal University of Parana albini@inf.ufpr.br April 20, 2012 Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 2. Introduction System Model Concepts Refrences Introduction Security 1 One of the most challenging issues for MANETs [WCWC06]: High vulnerability in security threats due to wireless communication and dynamic topology Adversaries can easly perfom attacks via wireless communcation channel Difficulty in implementation of security applications 2 Cryptography is the main technique used to ensure data communication security It does not provide information about the reliability of the nodes [LSY05] Key management relies on some degree of pre-established trust between nodes Trust is very difficult to be valued [BFL96] Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 3. Introduction System Model Concepts Refrences Introduction Security 1 One of the most challenging issues for MANETs [WCWC06]: High vulnerability in security threats due to wireless communication and dynamic topology Adversaries can easly perfom attacks via wireless communcation channel Difficulty in implementation of security applications 2 Cryptography is the main technique used to ensure data communication security It does not provide information about the reliability of the nodes [LSY05] Key management relies on some degree of pre-established trust between nodes Trust is very difficult to be valued [BFL96] Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 4. Introduction System Model Concepts Refrences Trust Concepts I Trust Can be defined as the trustworthiness of a trustor, or how much it is willing to take the risk of trust, in a trustee [Bus02] Trust management can be used in Support in decisions as intrusion detection [ACP+ 02] Authentication [GPM05] Access control [LKZ+ 04] Isolation of misbehaving nodes for effective routing [MGLB00] Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 5. Introduction System Model Concepts Refrences Trust Concepts I Trust Can be defined as the trustworthiness of a trustor, or how much it is willing to take the risk of trust, in a trustee [Bus02] Trust management can be used in Support in decisions as intrusion detection [ACP+ 02] Authentication [GPM05] Access control [LKZ+ 04] Isolation of misbehaving nodes for effective routing [MGLB00] Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 6. Introduction System Model Concepts Refrences Trust Concepts II In MANETs Routing strategies, distributed storage, location management, and key management or establishment Trust evaluation schemes Support and maintain trust evidences of nodes Ant-Based Evidence Distribution (ABED) proposed by [JB04]: 1 Nodes interact with each other through agents (“ants”) 2 Nodes are able to identify an optimal path to accumulate trust evidence 3 Such a scheme was not evaluated under any type of attack Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 7. Introduction System Model Concepts Refrences Trust Concepts II In MANETs Routing strategies, distributed storage, location management, and key management or establishment Trust evaluation schemes Support and maintain trust evidences of nodes Ant-Based Evidence Distribution (ABED) proposed by [JB04]: 1 Nodes interact with each other through agents (“ants”) 2 Nodes are able to identify an optimal path to accumulate trust evidence 3 Such a scheme was not evaluated under any type of attack Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 8. Introduction System Model Concepts Refrences Trust Evaluation Schemes I self-organizing trust-based Physical-Logical Domains Concept for Grouping nodes and support for distributed control in the newtwork [VJCU05]: A security architecture which uses trust to establish keys between nodes Establish secure distributed control in MANETs Nodes use trust information to form groups and to establish pair-wise key in the groups Suitable just for establishing group keys The scheme was not evaluated under attacks Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 9. Introduction System Model Concepts Refrences Trust Evaluation Schemes - Utilities support secure authentication for MANETs [CKLW09] SORI uses cooperation incentive based on reputation [HWK04]: 1 stimulating packet forwarding and disciplining selfish nodes through punishments 2 Nodes are able to identify an optimal path to accumulate trust evidence 3 The reputation of a node is calculated using objective metrics 4 The implementation of SORI to support other applications is very difficult Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 10. Introduction System Model Concepts Refrences Trust Evaluation Schemes - Utilities support secure authentication for MANETs [CKLW09] SORI uses cooperation incentive based on reputation [HWK04]: 1 stimulating packet forwarding and disciplining selfish nodes through punishments 2 Nodes are able to identify an optimal path to accumulate trust evidence 3 The reputation of a node is calculated using objective metrics 4 The implementation of SORI to support other applications is very difficult Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 11. Introduction System Model Concepts Refrences Trust Evaluation Schemes II Trust Models Model of [VLDP08]: Resistant to slander attacks, a variance of the bad mouthing ones Provides nodes with a mechanism to build a trust relationship with their neighbors Not suitable for applications that require trust information of nodes out of the radio range Model of [SHYL06] This model considers malicious attacks Secure routing operations and detect malicious nodes Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 12. Introduction System Model Concepts Refrences Trust Evaluation Schemes II Trust Models Model of [VLDP08]: Resistant to slander attacks, a variance of the bad mouthing ones Provides nodes with a mechanism to build a trust relationship with their neighbors Not suitable for applications that require trust information of nodes out of the radio range Model of [SHYL06] This model considers malicious attacks Secure routing operations and detect malicious nodes Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 13. Introduction System Model Concepts Refrences Trust Evaluation Schemes - Summary 1 The most os schemes were not evaluated under misbehavior attacks 2 The use of a non-secure trust evaluation scheme can harm the entire seure solution of system 3 The schemes that consider the presence of malicious nodes are limited to one network operation (routing) Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 14. Introduction System Model Concepts Refrences Our work Our scheme A trust evaluation scheme for MANETs: 1 To support any application 2 Resistant to misbehavior attacks In this scheme: 1 Each node creates a virtual layer to support trust information 2 Virtual layer (trust network) contains all trust informations 3 Such informations are gathered via recommendation or direct interaction 4 Trustworthiness of node is locally computed (Trust network of the node) Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 15. Introduction System Model Concepts Refrences Our work Our scheme A trust evaluation scheme for MANETs: 1 To support any application 2 Resistant to misbehavior attacks In this scheme: 1 Each node creates a virtual layer to support trust information 2 Virtual layer (trust network) contains all trust informations 3 Such informations are gathered via recommendation or direct interaction 4 Trustworthiness of node is locally computed (Trust network of the node) Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 16. Introduction System Model Concepts Refrences Our scheme evaluation scenarios Two kinds of attacks: 1 Bad mouthing: consist of malicious nodes providing dishonest trust evidences to defame good nodes or enhance trust values of bad ones [Del00]. 2 Newcomer (Sybil): consist of a malicious node registering a new identity and assigning high trust values to it. Simulations with NS: 1 Proposed scheme is robust and efficient 2 Trust evidences are quickly disseminated through the network 3 Nodes are able to effectively estimate the trustworthiness of other nodes 4 Proposed scheme is resistant to false accusation attacks Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 17. Introduction System Model Concepts Refrences Our scheme evaluation scenarios Two kinds of attacks: 1 Bad mouthing: consist of malicious nodes providing dishonest trust evidences to defame good nodes or enhance trust values of bad ones [Del00]. 2 Newcomer (Sybil): consist of a malicious node registering a new identity and assigning high trust values to it. Simulations with NS: 1 Proposed scheme is robust and efficient 2 Trust evidences are quickly disseminated through the network 3 Nodes are able to effectively estimate the trustworthiness of other nodes 4 Proposed scheme is resistant to false accusation attacks Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 18. Introduction Trust chain System Model NS - Evaluation Refrences Our scheme The scheme focuses on self-organized mobile ad hoc network Consist of a set of n nodes without losing generality Such nodes are considered to have similar functionalities Such nodes contribute to network operations and maintenance Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 19. Introduction Trust chain System Model NS - Evaluation Refrences Example of Trust Evaluation Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 20. Introduction Trust chain System Model NS - Evaluation Refrences Calculation Trust Value (TV ) After calculating the trust value for all chains, the trust value TV(nx ,nu ) can be calculated applying a weighted mean, as follows: k i i (TC(nx ,nu ) × 1/|TC(nx ,nu ) |) i=1 TV(nx ,nu ) = k (1) 1 i |TC(nx ,nu ) | i=1 weighted mean The weighted mean reduces the impact of transitivity in trust chains. This method aims to privilege small chains, following a social perspective. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 21. Introduction Trust chain System Model NS - Evaluation Refrences Calculation Trust Value (TV ) After calculating the trust value for all chains, the trust value TV(nx ,nu ) can be calculated applying a weighted mean, as follows: k i i (TC(nx ,nu ) × 1/|TC(nx ,nu ) |) i=1 TV(nx ,nu ) = k (1) 1 i |TC(nx ,nu ) | i=1 weighted mean The weighted mean reduces the impact of transitivity in trust chains. This method aims to privilege small chains, following a social perspective. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 22. Introduction Trust chain System Model NS - Evaluation Refrences Evalaution tool and scenario Evaluation with NS 2.34 Used for evaluate the performance and effectiveness of the proposed trust management scheme. Simulations were made with honest and malicious nodes. 100 nodes use the IEEE 802.11 with DCF as MAC protocol. Nodes move on an area of 1000m x 1000m, in random waypoint model (20 m/s) with 20s pause time. Total time of simulations is 2000s. Avarage of 35 simulations with 95% confidence interval Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 23. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios without Attackers Estimated trust values without attackers 0.9 0.6 0.8 0.7 0.5 Average Trust Values 0.6 0.4 0.5 0.3 β 0.4 0.3 0.2 0.2 0.1 0.1 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 24. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios without Attackers Reliable nodes without attackers 0.9 100 0.8 90 0.7 80 Trust Nodes Scale (%) 0.6 70 0.5 60 β 0.4 50 0.3 40 0.2 30 20 0.1 10 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 25. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios without Attackers Time to disseminate trust evidences and percentage of nodes in trust graphs α Time (sec.) Nodes (%) 0.0 198.51 100.00% 0.1 713.54 99.99% 0.2 801.49 99.96% 0.3 885.14 99.92% 0.4 936.97 99.35% 0.5 926.96 96.94% 0.6 878.08 92.57% 0.7 768.51 78.98% 0.8 598.22 50.37% 0.9 281.08 17.34% Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 26. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under bad mouthing attack 2% of attackers 0.9 20 0.8 0.7 16 Affected Nodes (%) 0.6 12 0.5 β 0.4 8 0.3 0.2 4 0.1 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 27. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under bad mouthing attack 5% of attackers 0.9 20 0.8 0.7 16 Affected Nodes (%) 0.6 12 0.5 β 0.4 8 0.3 0.2 4 0.1 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 28. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under bad mouthing attack 10% of attackers 0.9 16 0.8 0.7 12 Affected Nodes (%) 0.6 0.5 8 β 0.4 0.3 4 0.2 0.1 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 29. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under bad mouthing attack Trust variation in scenarios under attack β Attackers 2% 5% 10% 0.0 0.0055 0.0116 0.0158 0.1 0.0271 0.0503 0.0671 0.2 0.0365 0.0655 0.0868 0.3 0.0432 0.0803 0.1045 0.4 0.0561 0.0987 0.1290 0.5 0.0884 0.1355 0.1700 0.6 0.1619 0.2081 0.2390 0.7 0.3258 0.3403 0.3574 0.8 0.4300 0.4403 0.4339 0.9 0.2829 0.3277 0.3377 Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 30. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under newcomer attack 2% of attackers 0.9 100 0.8 90 0.7 80 Affected Nodes (%) 0.6 70 60 0.5 50 β 0.4 40 0.3 30 0.2 20 0.1 10 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 31. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under newcomer attack 5% of attackers 0.9 100 0.8 90 0.7 80 Affected Nodes (%) 0.6 70 60 0.5 50 β 0.4 40 0.3 30 0.2 20 0.1 10 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 32. Introduction Trust chain System Model NS - Evaluation Refrences Scenarios under newcomer attack 10% of attackers 0.9 100 0.8 90 0.7 80 Affected Nodes (%) 0.6 70 60 0.5 50 β 0.4 40 0.3 30 0.2 20 0.1 10 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 α Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 33. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 34. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 35. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 36. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 37. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 38. Introduction Trust chain System Model NS - Evaluation Refrences Conclusions Existing Trust Management schemes No specific attack model was addressed nor evaluated on [BR08, MM02, BLB02, DJQ09]. Some schemes are limited only to support routing strategies [MM02, BLB02, DJQ09]. Support for other applications is very difficult in [HWK04]. Our scheme 1 The nodes create a virtual trust network. 2 Contains trust information about other nodes. 3 Each node estimates the trustworthiness of other nodes. 4 Simulation results show the efficiency of our scheme. 5 The scheme is able to resist up to 10% of attackers. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 39. Introduction Trust chain System Model NS - Evaluation Refrences Distributed Self-organized Trust Management for MANETs Mehran Misaghi1 Eduardo da Silva2,3 Luiz Carlos P. Albini3 1 Research Department - Educational Society of Santa Catarina mehran@sociesc.org.br 2 Department of Informatics - Catarinense Federal Institute eduardos@inf.ufpr.br 3 Department of Informatics - Federal University of Parana albini@inf.ufpr.br April 20, 2012 Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 40. Introduction System Model Refrences Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic M´, and Ricardo Staciarini Puttini. e Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In Proceedings of the 1st International Workshop on Wireless Information Systems (WIS ’02), pages 1–12. ICEIS Press, April 2002. Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP ’96), page 164. IEEE Computer Society, 1996. Sonja Buchegger and Jean-Yves Le Boudec. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc ’02), pages 226–236, New York, NY, USA, 2002. ACM. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 41. Introduction System Model Refrences Azzedine Boukerche and Yonglin Ren. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN ’08), pages 88–95. ACM, 2008. Vincent Buskens. Social Networks and Trust. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2002. Ben-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, and De-Yu Wang. Markov chain-based trust model for analyzing trust value in distributed multicasting mobile ad hoc networks. 59:1846–1863, 2009. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 42. Introduction System Model Refrences Chrysanthos Dellarocas. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of the 21th International Conference on Information Systems (ICIS ’00), pages 520–525, Atlanta, GA, USA, 2000. Association for Information Systems. Hongjun Dai, Zhiping Jia, and Zhiwei Qin. Trust evaluation and dynamic routing decision based on fuzzy theory for manets. JSW – Journal of Software, 4(10):1091–1101, 2009. Tirthankar Ghosh, Niki Pissinou, and Kami Makki. Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6):985–995, 2005. Q. He, D. Wu, and P. Khosla. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 43. Introduction System Model Refrences SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (WCNC ’04), pages 825–830. IEEE Communications Society, 2004. Tao Jiang and John S. Baras. Ant-based adaptive trust evidence distribution in manet. In Proceedings of the 24th International Conference on Distributed Computing Systems Workshops(ICDCSW’04), pages 588–593. IEEE Computer Society, 2004. Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. Ursa: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transaction on Networking (TON), 12(6):1049–1063, 2004. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 44. Introduction System Model Refrences Xia Li, Jill Slay, and Shaokai Yu. Evaluating trust in mobile ad hoc networks. In Proceedings of the 2005 Workshop of International Conference on Computational Intelligence and Security (CIS ’05). Springer, 2005. Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom ’00), pages 255–265. ACM, 2000. Pietro Michiardi and Refik Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 45. Introduction System Model Refrences pages 107–121, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V. Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM ’06), pages 1–13. IEEE Communications Society, 2006. Mohit Virendra, Murtuza Jadliwala, Madhusudhanan Ch, and Shambhu Upadhyaya. Quantifying trust in mobile ad-hoc networks. In Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS ’05, pages 65–71. IEEE Computer Society, 2005. P. B. Velloso, R. P. Laufer, O.-C.M.B. Duarte, and G. Pujolle. A trust model robust to slander attacks in ad hoc networks. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs
  • 46. Introduction System Model Refrences In Proceedings of 17th International Conference on Computer Communications and Networks. (ICCCN ’08), pages 1–6. IEEE Communications Society, 2008. Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei. A survey on attacks and countermeasures in mobile ad hoc networks, chapter 12, pages 103–136. Springer-Verlag, New York, NY, USA, 2006. Mehran Misaghi - mehran@sociesc.org.br Distributed Self-organized Trust Management for MANETs