Opportunistic Trust Based P2P Services Framework for Disconnected MANETs | SpringerLink
Skip to main content

Opportunistic Trust Based P2P Services Framework for Disconnected MANETs

  • Conference paper
Autonomic and Trusted Computing (ATC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6407))

Included in the following conference series:

  • 626 Accesses

Abstract

In delay-tolerant disconnected Mobile Ad-hoc Networks (MANETs), mobile devices communicate with each other as they meet opportunistically establishing peer-to-peer (P2P) connections. Trust management in this type of networks is a challenging task due to the dynamic topology and decentralized nature and has attracted mant recent research interests. In this paper we propose a trust based framework for P2P services in a delay-tolerant disconnected MANET. The proposed framework utilizes a decentralized trust model and a P2P communication protocol for secure file exchange in an opportunistic store-carry and forward mechanism. We discuss the implementation of the framework and experiment with a gnutella style P2P file sharing application in a disconnected MANET. Our results provide important insight into the key challenges and short-comings face by researchers and engineers when designing and deploying such systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: social-based forwarding in delay tol-erant networks. In: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing SIGMOBILE 2008, pp. 241–250 (2008)

    Google Scholar 

  2. Almenarez, F., Marin, A., Diaz, D., Cortes, A., Campo, C., Garcia-Rubio, C.: A Trust based middleware for providing security to ad hoc peer to peer applications. In: Proceedings of the sixth annual IEEE International Conference on pervasive Computing and communications (PERCOMM 2008), pp. 531–536 (2008)

    Google Scholar 

  3. Jain, S., Fall, K., Patra, R.: Routing in a Delay Tolerant Network. In: Proceedings of ACM SIGCOMM 2004, Portland, OR (August 2004)

    Google Scholar 

  4. Zhang, Z., Zhang, Q.: Delay disruption tolerant mobile ad hoc networks: latest developments. Wireless Communications and Mobile Computing 7(10), 1219–1232 (2007)

    Article  Google Scholar 

  5. Daly, E.M., Haahr, M.: Social network analysis for routing in disconnected delay-tolerant MANETs. In: MobiHoc 2007: Proceedings of the 8th ACM int. symposium on Mobile ad hoc networking and computing (2007)

    Google Scholar 

  6. Pietilainen, A.-K., Diot, C.: Experimenting with opportunistic communications. In: MobiArch 2009: The 4th ACM International Workshop on Mobility in the Evolving Internet Architecture (2009)

    Google Scholar 

  7. Chaintreau, A., Fraigniaud, P., Lebhar, E.: Opportunistic spatial gos-sip over mobile social networks. In: Proceedings of the first workshop on Online social networks WOSN in SIGCOMM 2008, pp. 73–78 (2008)

    Google Scholar 

  8. Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: AAMAS 2005, pp. 997–1004. ACM, New York (2005)

    Google Scholar 

  9. Yu, B., Singh, M.P.: Detecting deception in reputation management. In: AAMAS 2003, pp. 73–80. ACM, New York (2003)

    Google Scholar 

  10. Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS, vol. (3), pp. 1485–1488 (2008)

    Google Scholar 

  11. Patwardhan, A., et al.: Active Collaborations for Trustworthy Data Management in Ad Hoc Networks. In: Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (November 2005)

    Google Scholar 

  12. Repantis, T., Kalogeraki, V.: Decentralized Trust Management for Ad-hoc Peer-to-peer Networks. In: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad- Hoc Computing (MPAC 2006) in conjunction with MIDDLEWARE 2006 (November 2006)

    Google Scholar 

  13. Su, J., Scott, J., Hui, P., Crowcroft, J., de Lara, E., Diot, C., Goel, A., Lim, M., Upton, E.: Haggle: Seamless networking for mobile applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391–408. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Almenárez, F., Marín, A., Díaz, D., Sánchez, J.: Developing a Model for Trust Management in Pervasive Devices. In: Third IEEE International Work-shop on Pervasive Computing and Communication Security (PerSec 2006) held in conjunction with IEEE PerCom 2006 ( March 2006)

    Google Scholar 

  15. Eagle, N., Pentland, A.: Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4(2) (2005)

    Google Scholar 

  16. Miklas, A., Gollu, K., Chan, K., Saroiu, S., Gummadi, K., de Lara, E.: Exploiting so-cialinteractions in mobile systems. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 409–428. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Nicolai, T., Yoneki, E., Behrens, N., Kenn, H.: Exploring social context with the wire-less rope. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 874–883. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Chang, Y.-J., Liu, H.-H., Chou, L.-D., Chen, Y.-W., Shin, H.-Y.: A General Architecture of Mobile Social Network Services. In: proceedings of the International Conference on Convergence Information Technology, November 21-23, pp. 151–156 (2007)

    Google Scholar 

  19. Tomiyasu, H., Maekawa, T., Hara, T., Nishio, S.: Profile-based Query Routing in a Mobile Social Network. In: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), pp. 105–109 (2006)

    Google Scholar 

  20. Pietiläinen, A.-K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: MobiClique: middleware for mobile social networking. In: Proceedings of the 2nd ACM workshop on Online social networks WOSN in SIGCOMM 2009, pp. 49–54 (2009)

    Google Scholar 

  21. EI Defrawy, K., Solis, J., Tsudik, G.: Leveraging Social Contacts for Mes-sage Confidentiality in Delay Tolerant Networks. In: 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seattle, July 20-24 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qureshi, B., Min, G., Kouvatsos, D. (2010). Opportunistic Trust Based P2P Services Framework for Disconnected MANETs. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16576-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16575-7

  • Online ISBN: 978-3-642-16576-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics