DocumentCode :
742969
Title :
A trust management scheme based on behavior feedback for opportunistic networks
Author :
Chen Xi ; Sun Liang ; Ma Jianfeng ; Ma Zhuo
Author_Institution :
Dept. of Post-Doctoral Res. Center, China Merchants Bank, Shenzhen, China
Volume :
12
Issue :
4
fYear :
2015
fDate :
4/1/2015 12:00:00 AM
Firstpage :
117
Lastpage :
129
Abstract :
In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering most of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of “Identity Trust” relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the “Behavior Trust” relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the delivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
Keywords :
mobile ad hoc networks; telecommunication network management; telecommunication security; trusted computing; MANET; behavior feedback; behavior trust relationship; delivery probability; forwarding operations; harsh environment; identity authentications; identity trust relationship; mobile ad-hoc networks; mobile nodes; mutual authentications; network routing; node density; novel trust management scheme; opportunistic networks; self-organized identity authentications; trust management scheme; trust nodes; trust reconstruction ratio; verified feedback packets; Authentication; Context; Cryptography; Mobile nodes; Routing protocols; forwarding protocols; key management; opportunistic networks; trust management; verified feedback packet;
fLanguage :
English
Journal_Title :
Communications, China
Publisher :
ieee
ISSN :
1673-5447
Type :
jour
DOI :
10.1109/CC.2015.7114058
Filename :
7114058
Link To Document :
بازگشت