Security Through Policy and Trust in Mobile Ad Hoc Networks


Tuesday, November 3, 2009, 10:15am - Tuesday, November 3, 2009, 11:30am

ITE 325 - B


Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media.Significant research efforts have been made to address the problem of misbehavior detection as well as trust management for MANETs. However,little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. Moreover, most current trust management schemes model the trustworthiness of an object in one dimension, i.e., all available evidence and observations is used to calculate a single, scalar trustworthiness metric for each object. However, a single measure may not be expressive enough to adequately describe a peer's trustworthiness peer in many scenarios. We address these problems from the following aspects:

1) We propose and develop a policy-based malicious peer detection mechanism, in which context information, such as communication channel status, buffer status, and transmission power level, are collected and used to determine whether the misbehavior is likely a result of malicious activity or not.

2) To better assess the trustworthiness of a peer in such scenarios, we use multi-dimensional trust to evaluate the trustworthiness of the peer from multiple perspectives. In our proposed multi-dimensional trust scheme, the trustworthiness of a peer is evaluated from three perspectives: collaboration trust, behavioral trust, and reference trust.

Simulation results illustrate that the malicious peer detection mechanism based on policy and multi-dimensional trust is able to distinguish malicious peers from faulty peers with high confidence. Moreover, the mechanism converges to a consistent view of malicious nodes amongst all the nodes with a limited communication overhead.

Participate remotely via dimdim. After 10:15, click on JOIN MEETING and enter 'ebiquity' for the meeting name.

Tim Finin

OWL Tweet

UMBC ebiquity