preview

Trust Management Essay

Decent Essays

II. RELATED WORKS
There has been extensive literature related to the security in wireless ad-hoc networks over the last two decades. There are several methods to increase the security other than trust management. Important among them are surveyed here.
Key management is a fundamental problem in securing mobile ad hoc networks (MANETs). In the paper, Securing Mobile Ad Hoc Networks with Certificateless Public Keys [1], Yanchao Zhang et al. presents IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. In IKM the public keys of mobile nodes can be directly derived from their known IDs and some common information, thus it provides a certificateless solution. The need for certificate-based …show more content…

These records are considered only when they come from a source that has consistently been trustworthy or when they pass the deviation test which evaluates compatibility with one’s own reputation ratings. They modify the reputation rating of a node slightly even after passing the test. The results of the deviation test are additionally used to update the trust rating. It can allow for redemption and prevent capitalizing excessively on past behavior by two mechanisms, namely re-evaluation and fading. This method is coping well with false second-hand reports, as it keeps the number of false positives and false negatives low. The detection of misbehaving nodes accelerates significantly with the use of selected second-hand information. Reputation management cannot completed in peer to peer connection is the disadvantage of this method.
In this paper, Securing Resource-Constrained Wireless Ad Hoc Networks [3], Yuguang Fang et al. a novel approach to addressing security issues and articulate why and how the ID based cryptography can be effectively applied to address various security problems in the resource-constrained wireless networks. This paper demonstrates the advantages of the IDPKC in resource-constrained wireless ad hoc networks and hopes to inspire more research on this approach. Many challenging problems are there. One of the obstacles is the computational

Get Access