In wireless mesh networks, the sample space of evidence may be not integrative or reliable because of the change of network topology and the occurrence of wireless collision. It makes the existing trust evaluation models inapplicable. To evaluate trust values of nodes and establish trust relationship in nodes, a trust model is proposed on the basis of the analyses of the existing trust models and the minimal principle of uncertainty metric. The model reduces the influence of the non-integrated and unreliable sample space through importing a credible parameter. According to the real situation of networks, the model can minimize the amendment of evaluation values in the whole scope. Contrasted with the evidence-based trust model, the simulation results show that the proposed model is effective.
[1] Zhou L, Haas ZJ. Securing ad hoc networks. Network IEEE, 1999,13(6):24-30.
[2] Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. In: Proc. of the ACM MOBICOM. 2000. 275-283. http://portal.acm.org/citation.cfm?doid=345910.345958
[3] Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th Annual ACM/IEEE Int’l Conf. on Mobile Computing and Networking. 2000. 255-265. http://portal.acm.org/citation.cfm?id=345910. 345955
[4] Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proc. of the 8th ACM Int’l Conf. on Mobile Computing and Networking. 2002. 12-23. http://www.geocities.com/prashthy/secure_routing_ad_hoc.html
[5] Eschenauer L, Gligor VD, Baras J. On trust establishment in mobile ad hoc networks. In: Proc. of the 10th Int’l Workshop on Security Protocols. 2002. 47-66. http://dblp.uni-trier.de/rec/bibtex/conf/spw/EschenauerGB02
[6] Manchala DW. Trust metrics, models and protocols for electronic commerce transactions. In: Proc. of the 18th Int’l Conf. on Distributed Computing Systems. 1998. 312-321. http://portal.acm.org/citation.cfm?id=850926.851678
[7] J?sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. In: Proc. of the Decision Support Systems. 2005. http://citeseer.ist.psu.edu/738255.html
[8] Yu B, Singh MP, Sycara K. Developing trust in large-scale peer-to-peer systems. In: Proc. of the 1st IEEE Symp. on Multi-Agent Security and Survivability. 2004. 1-10. http://jmvidal.cse.sc.edu/lib/yu04a.html
[9] Buchegger S, Boudec JL. Performance analysis of the confidant protocol. In: Proc. of the IEEE/ACM Symp. on Mobile Ad Hoc Networking and Computing. 2002. 226-236. http://portal.acm.org/citation.cfm?id=513828
[10] Theodorakopoulos G, Baras JS. Trust evaluation in ad-hoc networks. In: Proc. of the 2004 ACM Workshop on Wireless Security. 2004. 1-10. http://portal.acm.org/citation.cfm?id=1023648
[11] Theodorakopoulos G. Distributed trust evaluation in ad hoc networks [MS. Thesis]. University of Maryland, 2004.
[12] Housley R, Ford W, Polk W, Solo D. RFC 2459, Internet X.509 public key infrastructure, 1999.
[13] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proc. of the 3rd European Symp. on Research in Computer Security. 1994. 3-18. http://www.informatik.uni-trier.de/~ley/db/conf/esorics/esorics1994.html
[14] Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006,24(2):318-328.
[15] Mui L, Mojdeh M, Ari H. A computational mode of trust and reputation. In: Proc. of the 35th Hawaii Int’l Conf. on System Sciences. 2002. 2431-2439. http://portal.acm.org/citation.cfm?id=821158
[16] Zand D. Trust and managerial problem solving. Administrative Science Quarterly, 1972,17:229-239.
[17] Carnap R, Jeffrey RC. Studies in Inductive Logic and Probability, Vol.1. Berkeley: The University of California Press, 1971.
[18] Niiniluoto I. On a k-dimensional system of inductive logic. Philosophy of Science Association, 1976,2:425-477.
[19] Wang Y, Vassileva J. Bayesian network-based trust model. In: Proc. of the IEEE/WIC Int’l Conf. 2003. 372-378.
[20] Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proc. of the Int’l World Wide Web Conf. 2004. 17-22. http://citeseer.ist.psu.edu/guha04propagation.html
[21] Yu B, Munindar P. An evidential model of distributed reputation management. In: Proc. of the Int’l Conf. 2002. 294-301.
[22] Abdul-Rahman A, Hailes S. Using recommendations for managing trust in distributed systems. In: Proc. of the IEEE Malaysia Int’l Conf. on Communication’97. 1997. http://citeseer.ist.psu.edu/360414.html
[23] Johnson DB, Maltz DA, Hu YC. The dynamic source routing protocol for mobile ad hoc networks (DSR). 2004. http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt