Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks

作者: Jin-Hee Cho , Ananthram Swami , Ing-Ray Chen

DOI: 10.1109/CSE.2009.68

关键词:

摘要: We develop and analyze a trust management protocol for cognitive mission-driven group communication systems (GCSs) in mobile ad hoc networks (MANETs) using hierarchical modeling techniques based on stochastic Petri nets. The goal is to efficiently establish acceptable levels among nodes without prior interactions. seek identify the optimal length of chain peers web so as maximize chain, by trading off space level. network can dynamically adapt changing environments adjusting their design parameter settings over time an level with other nodes. define metric that captures unique characteristics concepts such MANETs. demonstrate exists maximizing metric.

参考文章(23)
Bernard Jouga, Ricardo Staciarini Puttini, Patrick Albers, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Wireless Information Systems. pp. 1- 12 ,(2002)
Ejaz Ahmed, Kashan Samad, Waqar Mahmood, None, Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks Asia Pacific Information Technology Security Conference (AUSCERT2006). ,(2006)
Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad-hoc networks ad hoc networks. pp. 47- 54 ,(2004)
Robin Sahner, Kishor S. Trivedi, Antonio Puliafito, Performance and Reliability Analysis of Computer Systems Springer US. ,(1996) , 10.1007/978-1-4615-2367-3
J. Macker, S. Corson, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations Request For Comments. ,vol. 2501, pp. 1- 12 ,(1999)
A. A. Pirzada, C. Mcdonald, Trust Establishment In Pure Ad-hoc Networks Wireless Personal Communications. ,vol. 37, pp. 139- 168 ,(2006) , 10.1007/S11277-006-1574-5
Jochen Mundinger, Jean-Yves Le Boudec, Analysis of a reputation system for Mobile Ad-Hoc Networks with liars Performance Evaluation. ,vol. 65, pp. 212- 226 ,(2008) , 10.1016/J.PEVA.2007.05.004
Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu, Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks intelligence and security informatics. pp. 75- 78 ,(2007) , 10.1109/ISI.2007.379537
F. Anjum, A.K. Ghosh, N. Golmie, P. Kolodzy, R. Poovendran, R. Shorey, D. Lee, Guest Editorial Security in Wireless Ad Hoc Networks IEEE Journal on Selected Areas in Communications. ,vol. 24, pp. 217- 220 ,(2006) , 10.1109/JSAC.2005.861070
Tirthankar Ghosh, Niki Pissinou, Kami Sam Makki, Towards designing a trusted routing solution in mobile ad hoc networks Mobile Networks and Applications. ,vol. 10, pp. 985- 995 ,(2005) , 10.1007/S11036-005-4454-4