Trust assessment in wireless ad-hoc networks

Houssein Hallani, Seyed A. Shahrestani

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[Wireless ad-hoc networks consist of devices communicating with each other without the need for a management infrastructure. As such, the very basic operation of ad-hoc networks is dependent on the cooperation of their nodes to provide connectivity and communication routes. In practice though, such cooperation may not always be achieved. Cases where some nodes behave in a selfish manner or maliciously are of particular interest and consequence. Such cases normally result in degradation of the performance of the network or even disruption of its operation altogether. To mitigate the effect of such nodes and to achieve higher levels of reliability, the communication rout should be based on utilization of reliable and trustworthy nodes. This clearly depends on evaluation of trust and trustworthiness of the nodes. This paper proposes an approach that is based on soft computing to establish quantifiable trust levels between the nodes of an ad-hoc network. The information on trust levels are then used in the routing decision making process. Extensive simulator studies that utilize the proposed approach are carried out, analyzed, and reported in this paper. The resulting relatively significant improvements in the performance of typical ad-hoc networks are also reported.]]
    Original languageEnglish
    Title of host publicationWireless Days 2008 (WD '08): Proceedings of the 1st IFIP/IEEE International Conference, held in Dubai, UAE, 24-27 November, 2008
    PublisherIEEE
    Number of pages5
    ISBN (Print)9781424428298
    Publication statusPublished - 2009
    EventInternational Federation for Information Processing. International Conference -
    Duration: 1 Jan 2009 → …

    Conference

    ConferenceInternational Federation for Information Processing. International Conference
    Period1/01/09 → …

    Keywords

    • ad hoc networks (computer networks)
    • trust
    • decision making
    • network security
    • reliability
    • fuzzy logic

    Fingerprint

    Dive into the research topics of 'Trust assessment in wireless ad-hoc networks'. Together they form a unique fingerprint.

    Cite this