A review of trust modeling in ad hoc networks

被引:33
作者
Mejia, Marcela [1 ]
Pena, Nestor [1 ]
Munoz, Jose L. [2 ]
Esparza, Oscar [2 ]
机构
[1] Univ Andes, Bogota, Colombia
[2] Tech Univ Catalonia, Barcelona, Spain
关键词
Trust; Information modelling; Cluster analysis; Social groups; Networking; Game theory; COOPERATION;
D O I
10.1108/10662240910927849
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - Mobile ad hoc networks rely on cooperation to perform essential network mechanisms such as routing. Therefore, network performance depends to a great extent on giving participating nodes an incentive for cooperation. The level of trust among nodes is the most frequently used parameter for promoting cooperation in distributed systems. There are different models for representing trust, each of which is suited to a particular context and leads to different procedures for computing and propagating trust. The goal of this study is to analyze the most representative approaches for mobile ad hoc networks. It aims to obtain a qualitative comparison of the modeling approaches, according to the three basic components of a trust model: information gathering, information scoring and ranking, and action execution. Design/methodology/approach - The paper identifies the different tasks required by a trust system and compares the way they are implemented when the system model itself is based on information theory, social networks, cluster concept, graph theory and game theory. It also provides a common nomenclature for the models. The study concentrates exclusively on the trust models themselves, without taking into account other aspects of the original articles that are beyond the scope of this analysis. Findings - The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to conduct an objective comparison. Finally, it also notices that most of the models do not properly manage node reintegration. Originality/value - The best of our knowledge, the study is the first that uses information scoring and ranking as classification key. According to this key, approaches can be classified as based on information theory, clusters and social network theory, and cooperative and non-cooperative game theory. It also provides a common nomenclature for all of them. Finally, the main contribution of the paper is to provide an analysis of the most representative approaches and present a novel qualitative comparison.
引用
收藏
页码:88 / 104
页数:17
相关论文
共 44 条
[1]  
Amis A. D., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P32, DOI 10.1109/INFCOM.2000.832171
[2]  
Anderegg L., 2003, Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, P245, DOI DOI 10.1145/938985.939011
[3]  
[Anonymous], 1994, P EUR S RES SESC ESO
[4]  
BALAKRISHNAN V, 2007, 15 IEEE INT C NETW I, P182
[5]  
Bansal S., 2003, OBSERVATION BASED CO
[6]  
BARAS J, 2006, ADV CONTROL COMMUNIC, P183
[7]  
Buchegger S, 2002, P 3 ACM INT S MOB AD, P226, DOI DOI 10.1145/513800.513828
[8]   Cooperation issues in mobile ad hoc networks [J].
Conti, M ;
Gregori, E ;
Maselli, G .
24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, :803-808
[9]   An entropy-based trust modeling and evaluation for wireless sensor networks [J].
Dai Hongjun ;
Jia Zhiping ;
Dong Xiaona .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, :27-+
[10]   CASAN: Clustering algorithm for security in ad hoc networks [J].
Elhdhili, Mohamed Elhoucine ;
Ben Azzouz, Lamia ;
Kamoun, Farouk .
COMPUTER COMMUNICATIONS, 2008, 31 (13) :2972-2980