Abstract
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes). This paper develops a distributed reputation model of MANET using concepts from Dempster-Shafer theory. The agents and the host platforms work together so that each trusted node may form a consistent trust view of MANET. An agent may share its view of the network with a visited host. To speed up convergence, a node broadcasts information regarding a suspected node. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Songsiri, S.: MTrust: A Reputation-Based Trust Model for a Mobile Agent System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 374–385. Springer, Heidelberg (2006)
Jøsang, A.: Trust-Based Decision Making for Electronic Transactions. In: Yngström, L., Svensson, T. (eds.) Proc. of the 4th Nordic Workshop on Secure Computer Systems (1999)
Whitby, A., Jøsang, A., Indulka, J.: Filtering out unfair Ratings in Bayesian Reputation Systems. The Icfain Journal of Management Research 4(2), 48–64 (2005)
Luke Teacy, W.T., Patel, J., Jennings, N.R., Luck, M.: Coping with Inaccurate reputation Sources: Experimental Analysis of a Probabilistic Trust Model. In: AAMAS 2005 (2005)
Li, F., Wu, J.: Mobility reduces uncertainty in MANETs. In: Proc. of INFOCOM 2007, pp. 1946–1954 (2007)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Li, N., Das, S.K.: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks (in press)
Yu, B., Singh, M.: Detecting Deception in Reputation Management. In: Proc. of the 2nd International Joint Conf. on Autonomous Agents and Multi Agent Systems, pp. 73–80 (2003)
Lu, P., Li, B., Xing, M.L., Li, L.: D-S Theory-based Trust Model FIRE in Multi-agent Systems. In: The Proc of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 255–260 (2007)
Chowdhury, C., Neogy, S.: Reliability Estimate of Mobile Agent Based System for QoS MANET Applications. In: The Annual Reliability and Availability Symposium, pp. 1–6 (2011)
Bettstetter, C.: Smooth is better than sharp: a random mobility model for simulation of wireless networks. In: The Proc. of the Fourth ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 19–25 (2001)
Meier, R.T., Dunkel, J., Kakuda, Y., Ohta, T.: Mobile agents for service discovery in ad hoc networks. In: Proc. 22nd International Conference on Advanced Information Networking and Applications, pp. 114–121 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chowdhury, C., Neogy, S. (2011). Mobile Agent Security in MANET Using Reputation. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-24037-9_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24036-2
Online ISBN: 978-3-642-24037-9
eBook Packages: Computer ScienceComputer Science (R0)