Trust Management in Mobile Ad Hoc Networks for QoS Enhancing

Trust Management in Mobile Ad Hoc Networks for QoS Enhancing

ISBN13: 9781466696242|ISBN10: 1466696249|EISBN13: 9781466696259
DOI: 10.4018/978-1-4666-9624-2.ch029
Cite Chapter Cite Chapter

MLA

Abassi, Ryma. "Trust Management in Mobile Ad Hoc Networks for QoS Enhancing." Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 632-659. https://doi.org/10.4018/978-1-4666-9624-2.ch029

APA

Abassi, R. (2016). Trust Management in Mobile Ad Hoc Networks for QoS Enhancing. In I. Management Association (Ed.), Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications (pp. 632-659). IGI Global. https://doi.org/10.4018/978-1-4666-9624-2.ch029

Chicago

Abassi, Ryma. "Trust Management in Mobile Ad Hoc Networks for QoS Enhancing." In Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 632-659. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9624-2.ch029

Export Reference

Mendeley
Favorite

Abstract

In a collaborative environment such as MANET, nodes reliability evaluation is vital. Trust Management can be used to ensure such healthy collaboration it offers a formal and unified framework for trust specification and interpretation. Establishing trustworthy relationships is generally done by maintaining a reputation for each node computed based on direct observations or neighbors' observations exchanged using recommendations. Unfortunately, for malicious reason, such method may be faked by cheaters: several nodes collude in order to rate each other with the maximum value and decrease other nodes' reputations by giving negative recommendations. The main contribution of this chapter is then, the proposition of a trust based environment for MANET and securing it against collusion attack in order to enhance the network QoS. This is achieved using three steps: (1) the definition of a formal trust based environment (2) the addition of a process handling collusion attack and (3) the extension of the whole proposition by a delegation process allowing nodes functionalities sharing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.