By Topic

Trust Management in Wireless Mobile Networks with Cooperative Communications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Changiz, R. ; Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON, Canada ; Halabian, H. ; Yu, F.R. ; Lambadaris, I.
more authors

Cooperative communication makes use of the broadcast nature of the wireless medium where adjacent nodes overhear the message transmitted by the source and assist in the transmission by relaying the overheard message to the destination. Although cooperative communication brings in significant benefits, it also raises serious security issues to wireless mobile networks. For example, there exists a possibility that a node refuses to cooperate when it is selected for cooperation or deliberately drop the received packets. In wireless mobile networks with cooperative communication, trust management is an important mechanism to monitor such networks for violations of security. In this paper, we propose a trust management method for wireless mobile networks with cooperative communications. Conventional Bayesian methodology is insufficient for the cooperative communication paradigm, as it is biased by the channel conditions and relay selection decision processes. Therefore, we modify the conventional trust management method by incorporating not only the relay selection policy but also the dynamic wireless channel conditions among the source, relays and destination. Simulation results are presented to show the effectiveness of the proposed scheme.

Published in:

Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on

Date of Conference:

11-13 Dec. 2010