By Topic

Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Asmidar Abu Bakar ; Dept. of Syst. & Networking, UNITEN, Kajang, Malaysia ; Roslan Ismail ; Abdul Rahim Ahmad ; Jamalul-Lail Abdul Manan

Trust play important roles in Mobile ad hoc networks since nodes may randomly joined and leave the network at their own pace. In catastrophe like massive accident or earthquake, groups of rescue personnel form a temporary network structure at the rescue site using their portable devices for coordinating the rescue relief. These groups of user from different agency need to use the temporary network for communication and also for sharing the information. Trust plays important roles in these groups since sharing of information must be among trusted and authorized nodes only. In this paper we form trust model adopting the PGP web-of-trust concept with subjective logic. The PGP web-of-trust is suitable method to adopt in mobile ad hoc networks since nodes are communicating based on peer to peer, hence peer recommendation can be use to create trust between peers. The use of subjective logic operators for calculating trust in the proposed trust model is appropriate since there is an element such as uncertainty as part of calculation. Uncertainty is important in this dynamic network since we do not have full information when decision is make. The trust value later is mapped with the access control policy to determine user access privileges.

Published in:

Social Computing (SocialCom), 2010 IEEE Second International Conference on

Date of Conference:

20-22 Aug. 2010