Critical issues in trust management for Mobile Ad-Hoc Networks

Author(s):  
Rajan Shankaran ◽  
Vijay Varadharajan ◽  
Mehmet A. Orgun ◽  
Michael Hitchens
2010 ◽  
Vol 7 (3) ◽  
pp. 172-185 ◽  
Author(s):  
Pedro B. Velloso ◽  
Rafael P. Laufer ◽  
Daniel de O. Cunha ◽  
Otto Carlos M.B. Duarte ◽  
Guy Pujolle

2016 ◽  
Vol 2016 ◽  
pp. 1-18
Author(s):  
Eduardo da Silva ◽  
Luiz Carlos Pessoa Albini

As a consequence of the particularities of Mobile Ad Hoc Networks (MANETs), such as dynamic topology and self-organization, the implementation of complex and flexible applications is a challenge. To enable the deployment of these applications, several middleware solutions were proposed. However, these solutions do not completely consider the security requirements of these networks. Based on the limitations of the existing solutions, this paper presents a new secure middleware, called Secure Middleware for Ad Hoc Networks (SEMAN), which provides a set of basic and secure services to MANETs aiming to facilitate the development of distributed, complex, and flexible applications. SEMAN considers the context of applications and organizes nodes into groups, also based on these contexts. The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. It has the following components: key management, trust management, and group management. All these components were developed and are described in this paper. They are supported by a cryptographic core and behave according to security rules and policies. The integration of these components provides security guarantees against attacks to the applications that usethe middleware services.


Author(s):  
Sarbjeet Singh

Establishing trust in Mobile Ad hoc Networks (MANETs) is a challenging task. Trust management consists of various activities like prediction of trust, computation of trust, propagation of trust, aggregation of trust etc. Trust prediction can be done based on past behavior of node, internal parameters of the node, or it can be induction-based or neural-network based. Trust computation can be centralized or distributed. Trust propagation can be social networks based, small world phenomenon based, web of trust based, distributed hash table based. Trust aggregation can be weighted average based, probability based, sequential, conditional-sequential, parallel or subjective logic based. This work presents the review of various activities pertaining to trust management to enable researchers, academicians and practitioners to identify and address trust related issues in a better way.


Sign in / Sign up

Export Citation Format

Share Document