15Jun 2017

SECURITY BREACHES IN TRUST MANAGEMENT SCHEMES IN MOBILE AD-HOC NETWORKS.

  • Research Scholar, Department of Computer Science & Engineering, Faculty of Engineering & Technology, Manav Rachna International University, Faridabad, 121001, India.
  • Professor & Dean, Department of Electronics Communication & Engineering, Faculty of Engineering & Technology, Manav Rachna International University, Faridabad, 121001, India.
  • Assistant Professor. Department of Computer Science & Engineering, YMCA University of Science & Technology, Faridabad, 121001, India.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

A Mobile Ad-Hoc Network allows distributed decision making by letting every node to take part in a routing decision. In this decision making the trust can play an important role. Establishing a trust among nodes is considered to be an influential tool to protect the wireless network. The nodes in the network can communicate with each other by building an acceptable level of trust relationships among themselves. But the trust management schemes themselves can be vulnerable to attacks. Trust Propagation and trust management in order to establish a trust, update a trust and revocation the trust is more challenging in a resource constrained MANET as compared to other traditional communication networks due to the dynamic topology change, mobility, conditions of propagation channels. In MANET, a malicious node can cause significant data damage and adversely influence the quality of the data. Thus, trust level analysis of a device can impact the certainty with which a device conducts data exchange with other device. The uncertainty and incompleteness of the trust evidence can be derived due to the dynamic characteristics of MANET. This paper is intended to pioneer the benefits of trust in MANET, investigate the various trust management schemes developed for MANET putting forward the summary of these techniques and the vulnerabilities associated with the trust management. The paper highlights the potential attacks and their impact on trust management in MANET.


  1. Abdul-Rahman and S. Hailes, ?Using Recommendations for Managing Trust in Distributed Systems,? Proc. IEEE Malaysia Int?l Conf. on Communication (MICC?97), Kuala Lumpur, Malaysia, Aug. 1997.
  2. J. Adams, N. J. Davis, ?Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration,? Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW?05), 15-17 June, 2005, West Point, NY, pp. 317-324.
  3. Ahmed, K. Samad and W. Mahmood, ?Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks.? AusCERT Asia Pacific Information Technology Security Conf., Gold Coast, Australia, 21-26 May 2006.
  4. Albers, O. Camp, J.-M. Percher, B. Jouga, L. M?, and R. Puttini, ?Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches?, Proc. 1st Int?l Workshop on Wireless Information Systems (WIS-2002), Apr. 2002, pp. 1-12.
  5. Boukerche and Y. Ren, ?A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks,? Proc. Int?l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008.
  6. Buchegger and J. ?Y. Le Boudec, ?Node Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,? Proc. IEEE 10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing, Canary Islands, Spain, Jan. 2002, pp. 403-410.
  7. Buchegger and J. ?Y. Le Boudec, ?Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks,? Proc. 3rd IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC), Lausanne, CH, 9-11 June 2002, pp. 226-236.
  8. Buchegger and J.Y.L. Boudec, ?A Robust Reputation System for P2P and Mobile Ad-hoc Networks,? Proc. 2nd Workshop on the Economics of Peer-to-Peer Systems, 15 Nov. 2004.
  9. Blaze, J. Feigenbaum, and J. Lacy, ?Decentralized Trust Management,? Proc. IEEE Symposium on Security and Privacy, 6-8 May, 1996, pp. 164 ? 173.
  10. Capra, ?Toward a Human Trust Model for Mobile Ad-hoc Networks,? Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
  11. Eschenauer, V. D. Gligor, and J. Baras, ?On Trust Establishment in Mobile Ad Hoc Networks,? Proc. 10th Int?l Security Protocols Workshop, Cambridge, U.K., Apr. 2002, vol. 2845, pp. 47-66.
  12. Gahlin, ?Secure Ad Hoc Networking,? Master?s Thesis, University of Ume?, March 2004. [13] Gambetta, ?Can We Trust Trust?? Trust: Making and Breaking Cooperative Relations, Basil Blackwell, Oxford, 1990, pp. 213-237.
  13. Ghosh, N. Pissinou, and K. Makki, ?Towards Designing a Trust Routing Solution in Mobile Ad Hoc Networks,? Mobile Networks and Applications, vol. 10, pp. 985-995, 2005.
  14. Golbeck, ?Computing with Trust: Definition, Properties, and Algorithms,? Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks, Baltimore, MD, 28 Aug. ? 1 Sep. 2006, pp. 1-7.
  15. He, D. Wu, and P. Khosla, ?SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-Hoc Networks,? Proc. IEEE Wireless Communications and Networking Conf., vol. 2, pp. 825-830, March 2004.
  16. Inkinen, ?New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes,? Seminar on Internetworking, Sj?kulla, Finland, Spring 2004.
  17. Kardof and D. Wagner, ?Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,? Proc. 1st IEEE Int?l Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, 11 May 2003, pp. 113-117.
  18. S. James, ?The Trust Paradox: A Survey of Economic Inquiries into the Nature of Trust and Trustworthiness,? Journal of Economic Behavior and Organization, vol. 47, no. 3, 2002.
  19. Jiang and J. S. Baras, ?Ant-based Adaptive Trust Evidence Distribution in MANET,? Proc. 2nd Int?l Conf. on Mobile Distributed Computing Systems Workshops (MDC), Tokyo, Japan, 23-24 March 2004, pp. 588-593.
  20. Josang and S. LoPresti, ?Analyzing the Relationship between Risk and Trust,? Proc. 2nd Int?l Conf. Trust Management (iTrust?04), LNCS, Springer-Verlag, 2004, pp. 135-145.
  21. Li, R. Li, and J. Kato, ?Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc Networks,? IEEE Communications Magazine, vol. 46, no. 4, Apr. 2008, pp. 108-114.
  22. Li, J. Li, P. Liu, H. H. Chen, ?An Objective Trust Management Framework for Mobile Ad Hoc Networks,? Proc. IEEE 65th Vehicular Technology Conf. (VTC?07), 22-25 Apr. 2007, pp. 56-60.
  23. Liu and V. Issarny, ?Enhanced Reputation Mechanism for Mobile Ad Hoc Networks,? Proc. 2nd Int?l Conf. of Trust Management (iTrust 2004), Oxford, UK, March 2004.
  24. Liu, A. W. Joy, and R. A. Thompson, ?A Dynamic Trust Model for Mobile Ad Hoc Networks,? Proc. 10th IEEE Int?l Workshop on Future Trends of Distributed Computing Systems, Sushou, China, 26-28 May 2004, pp. 80-85.
  25. Li and M. Singhal, ?Trust Management in Distributed Systems,? Computers, vol. 40, no.2, Feb. 2007, pp. 45-53.
  26. Luhmann, Trust and Power, Wiley, 1979.
  27. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, ?URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,? IEEE/ACM Transactions on Networking (TON), vol. 12, no. 6, Dec. 2004, pp. 1049-1063.
  28. Marsh, ?Formalizing Trust as a Computational Concept,? Department of Mathematics and Computer Science: University of Stirling, 1994.
  29. Marti, T. Giuli, K. Lai, and M. Baker, ?Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,? Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug. 2000, pp.255-265.
  30. McKnight and N. Chevany, ?The Meanings of Trust,? Carlson School of Management, University of Minnesota, Technical Report TR 94-04, 1996.
  31. Parasuraman, ?Humans and Automation: Use, Misuse, Disuse, Abuse,? Human Factors, vol. 39, no. 2, 1997, pp. 230-253.
  32. Paul and D. Westhoff, ?Context-Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks,? Proc. IEEE Globecom Conf., Taipeh, Taiwan, 2002.
  33. Pirzada and C. McDonald, ?Establishing Trust in Pure Ad Hoc Networks,? Proc. 27th Australasian Computer Science Conf. (ACSC), vol. 26, 2004, pp. 47-54. [35] A. Pirzada, C. McDonald, and A. Datta, ?Performance Comparison of Trust-based Reactive Routing Protocols,? IEEE Transactions on Mobile Computing, vol. 5, no. 6, June 2006, pp. 695-710.
  34. Plesse, J. Lecomte, C. Adjih, M. Badel, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler, A. Plakoo, ?OLSR Performance Measurement in a Military Mobile Ad Hoc Network,? Proc. 24th Int?l Conf. on Distributed Computing Systems, 2004, pp. 704-709. [37] S. Ruohomaa and L. Kutvonen, ?Trust Management Survey,? P. Herrmann et al. (Eds.), iTrust 2005, Lecture Notes in Computer Science, vol. 3477, 2005, pp. 77-92.
  35. Solhaug, D. Elgesem, and K. Stolen, ?Why Trust is not proportional to Risk?? Proc. 2nd Int?l Conf. on Availability, Reliability, and Security (ARES?07), 10-13 April 2007, Vienna, Austria, pp. 11-18.
  36. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, ?Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,? IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 305-317.
  37. Jiang and J. S. Baras, ?Ant-based Adaptive Trust Evidence Distribution in MANET,? Proc. 2nd Int?l Conf. on Mobile Distributed Computing Systems Workshops (MDC), Tokyo, Japan, 23-24 March 2004, pp. 588-593.
  38. Theodorakopoulos and J. S. Baras, ?On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,? IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 318- 328.
  39. Boukerche and Y. Ren, ?A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks,? Proc. Int?l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008.
  40. Marti, T. Giuli, K. Lai, and M. Baker, ?Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks?, Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug.2000, pp. 255-265.
  41. Michiardi and R.Molva,?CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-Hoc Networks,? The 6th IFIP Conf. on Security Communications, and Multimedia, Porotoz, Slovenia, 2002.
  42. He, D.Wu, and P. Khosla, ?SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-Hoc Networks,? Proc. IEEE Wireless Communications and Networking Conf., vol.2, pp. 825-830, March2004.
  43. K. Nekkanti andC. Lee,?Trust-based Adaptive On Demand Ad-Hoc Routing Protocol,? Proc. 42th Annual ACM Southeast Regional Conf., Huntsville, Alabama, 2004, pp.88-93.
  44. Li, M. R. Lyu and J. Liu, ?A Trust Model Based Routing Protocol for Secure Ad-Hoc Networks,? Proc. 2004 IEEE Aerospace Conf., BugSky, Montana, 6-13 Mar. 2004, vol.2, pp.1286-1295.
  45. Marti, T. Giuli, K. Lai, and M. Baker, ?Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks, ?Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug.2000, pp.255-265.
  46. Buchegger and J.?Y. Le Boudec, ?Node Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks, ?Proc. IEEE 10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing, pp.403-410, Canary Islands, Spain, Jan.2002.
  47. Buchegger and J.?Y. LeBoudec, ?Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks, ?Proc. 3rd IEEE/ACM Symposium on Mobile AdHoc Networking and Computing, Lausanne, CH, 9-11 June 2002, pp.226-236.
  48. Paul and D. Westhoff, ?Context-Aware Detection of Selfish Nodes in DSR based Ad-Hoc Networks,?Proc. IEEE Globecom Conf., Taipeh, Taiwan, 2002.
  49. Michiardi and R.Molva, ?CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperationin Mobile AdHoc Networks, ?The 6th IFIP Conf. on Security Communications, and Multimedia, Porotoz, Slovenia, 2002.
  50. Li, N. Li, X. Wang and T. Yu, ?Denial of service attacks and defenses in decentralized trust management,? in Secure comm and Workshops, 2006, pp. 1?12.
  51. Dellarocas, ?Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems,? in The twenty first international conference on Information systems, ICIS ?00, pp. 520?525, 2000.
  52. F. Perrone and S. C. Nelson, ?A study of on-off attack models for wireless ad-hoc networks,? in First IEEE International Workshop on Operator-Assisted (Wireless Mesh) Community Networks, 2006.
  53. L. Sun, Z. Han, W. Yu and K. J. Ray Liu, ?Attacks on trust evaluation in distributed networks,? in IEEE International Conference on Information Sciences and Systems, CISS, March 2006.
  54. Newsome, E. Shi, D. Song, and A. Perrig, ?The sybil attack in sensor networks: analysis & defenses,? in The 3rd international symposium on Information processing in sensor networks, IPSN ?04, pp. 259?268, 2004.
  55. R. Douceur, ?The sybil attack,? in First International Workshop on Peer-to-Peer Systems, IPTPS ?01, pp. 251?260, 2002.
  56. D. Microsoft, J. R. Douceur, and J. S. Donath, ?The sybil attack,? in Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), pp. 251?260, 2002.
  57. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, ?Reputation systems,? Communications of the ACM, vol. 43, no. 12, pp. 45?48, 2000.

[Bindiya Bhatia, M. K. Soni and Parul Tomar. (2017); SECURITY BREACHES IN TRUST MANAGEMENT SCHEMES IN MOBILE AD-HOC NETWORKS. Int. J. of Adv. Res. 5 (Jun). 405-412] (ISSN 2320-5407). www.journalijar.com


Bindiya Bhatia
Manav Rachna International University, Faridabad

DOI:


Article DOI: 10.21474/IJAR01/4425      
DOI URL: http://dx.doi.org/10.21474/IJAR01/4425