Implementation of a Regression-based Trust Model in a Wireless Ad hoc Testbed
Abstract
Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust based security modelling go hand in hand with cryptographic services to offer good security services. We have implemented a vector auto regression (VAR) based trust model over ad hoc on demand distance vector protocol and optimised link state routing protocol. The novelty in this model lies in capturing individual functional behaviours of a neighbour in an ad hoc network and modeling them as regression parameters. The experimental results show the feasibility of implementing trust models over real ad hoc network deployments. The simulations results show that the proposed VAR trust model offers better performance compared to the existing trust models.
Defence Science Journal, 2012, 62(1), pp.167-173, DOI:http://dx.doi.org/10.14429/dsj.62.1431
References
Sivaram Murthy, C. & Manoj, B.S. Ad hoc wireless networks. Pearson Education, 2001. 20 p.
Butty´an, L. & Hubaux, J.P. Security and co-operation in wireless networks. Cambridge University Press, 2007. 30 p.
Pirzada, A.A.; Datta, A. & McDonald, C. Incorporating trust and reputation in DSR protocol for dependable routing. Computer Communications, 2006, 29(15), 2806-21.
Yu, M.; Zhou, M. & Su, W. A secure routing protocol against Byzantine Attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol., 2009, 58(1), 449-60.
Velloso, P.B.; Laufer, R.P.; Cunha, D.O.; Duarte, O.C.M.B. & Pujolle, G. Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans. Netw. Serv. Management., 2010, 7(3), 172-85.
Theodorakopoulos, G. & Baras, J.S. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun., 2006, 24(2), 318–28.
Zapata, M.G. Secure ad hoc on-demand distance vector routing. ACM Mobile Comput. Commun. Rev., 2002, 6(3), 106-07.
Papadimitratos, P. & Haas, Z.J. Secure link state routing for mobile ad hoc networks. In Proceedings of the IEEE CS Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, Jan 2003. pp. 379-83.
Papadimitratos, P. & Haas, Z.J. Secure data communication in mobile ad hoc networks. IEEE J. Sel. Areas Commun., 2006, 24(2), 343-56.
Conti, M. & Giordano, S. Multihop ad hoc networking: The reality. IEEE Commun. Mag., 2007, 45(4), 88-95.
Burbank, J.L.; Chimento, P.F.; Haberman, B.K. & Kasch, W.T. Key Challenges of military tactical networking and the elusive promise of MANET technology. IEEE Commun. Mag., 2006, 44(11), 39-45.
Chang, B.-J. & Kuo, S.-J. Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Trans. Veh. Technol., 2009, 58(4), 1846-863.
Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D. & Tygar, J. SPINS: Security protocols for sensor networks. In Proceedings of ACM Mobile Computing and Networking (MobiCom), Rome, Italy, 2001. pp. 189-99.
Zhu, S.; Setia, S. & Jajodia, S. LEAP: Efficient security mechanisms for large scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security, New York, 2003. pp. 62-72.
Boukerch, A.; Xu, L. & El-Khatib, K. Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 2007, 30(11-12), 2413-427.
Bedi, P.; Sinha, A.K.; Agarwal, S.; Awasthi, A.; Prasad, G. & Saini, D. Influence of terrain on modern tactical combat: Trust-based recommender system. Def. Sci. J., 2010, 60(4), 405-11.
Wang, K. & Wu, M. Co-operative communications based on trust model for mobile ad hoc networks. IET Inf. Secur., 2010, 4(2), 68-79.
Biller, B. & Nelson, B.L. Modeling and Generating Multivariate Time-series input processes using a vector autoregressive technique. ACM Trans. on Model. Comput. Simul. 2003, 13(3), 211-37.
Gujarati, D.N. Basic econometrics, McGraw-Hill/Irvin, 2003. 302 p.
Uppsala University, http://apetestbed.sourceforge.net/. [Accessed on 16 January 2012].
Where otherwise noted, the Articles on this site are licensed under Creative Commons License: CC Attribution-Noncommercial-No Derivative Works 2.5 India