By Topic

An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yonglin Ren ; Sch. of Inf. Technol. & Eng., Univ. of Ottawa, Ottawa, ON ; Boukerche, A.

The security of wireless and mobile networks has an important influence on the performance of these networks. As a result, many approaches have been developed to enhance their security. Recently, the technique of trust and reputation evaluation has attracted much interest, since it can evaluate the trustworthiness of nodes in a centralized way. This paper addresses the issue of efficient reputation evaluation in wireless networks via a distributed approach. We first present the trust relationship between two entities before formalizing the concept of the community to be established over the trusted nodes. A generalized computational reputation prototype is formulated and a set of reputation management mechanisms is established to effectively prevent malicious nodes from entering the trusted community. Through the proof of the prototype's correctness, our system is analyzed to show how it offers provable security properties and prevents improper behaviors within a community.

Published in:

Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE

Date of Conference:

Nov. 30 2008-Dec. 4 2008