Abstract
In delay-tolerant disconnected Mobile Ad-hoc Networks (MANETs), mobile devices communicate with each other as they meet opportunistically establishing peer-to-peer (P2P) connections. Trust management in this type of networks is a challenging task due to the dynamic topology and decentralized nature and has attracted mant recent research interests. In this paper we propose a trust based framework for P2P services in a delay-tolerant disconnected MANET. The proposed framework utilizes a decentralized trust model and a P2P communication protocol for secure file exchange in an opportunistic store-carry and forward mechanism. We discuss the implementation of the framework and experiment with a gnutella style P2P file sharing application in a disconnected MANET. Our results provide important insight into the key challenges and short-comings face by researchers and engineers when designing and deploying such systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: social-based forwarding in delay tol-erant networks. In: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing SIGMOBILE 2008, pp. 241–250 (2008)
Almenarez, F., Marin, A., Diaz, D., Cortes, A., Campo, C., Garcia-Rubio, C.: A Trust based middleware for providing security to ad hoc peer to peer applications. In: Proceedings of the sixth annual IEEE International Conference on pervasive Computing and communications (PERCOMM 2008), pp. 531–536 (2008)
Jain, S., Fall, K., Patra, R.: Routing in a Delay Tolerant Network. In: Proceedings of ACM SIGCOMM 2004, Portland, OR (August 2004)
Zhang, Z., Zhang, Q.: Delay disruption tolerant mobile ad hoc networks: latest developments. Wireless Communications and Mobile Computing 7(10), 1219–1232 (2007)
Daly, E.M., Haahr, M.: Social network analysis for routing in disconnected delay-tolerant MANETs. In: MobiHoc 2007: Proceedings of the 8th ACM int. symposium on Mobile ad hoc networking and computing (2007)
Pietilainen, A.-K., Diot, C.: Experimenting with opportunistic communications. In: MobiArch 2009: The 4th ACM International Workshop on Mobility in the Evolving Internet Architecture (2009)
Chaintreau, A., Fraigniaud, P., Lebhar, E.: Opportunistic spatial gos-sip over mobile social networks. In: Proceedings of the first workshop on Online social networks WOSN in SIGCOMM 2008, pp. 73–78 (2008)
Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: AAMAS 2005, pp. 997–1004. ACM, New York (2005)
Yu, B., Singh, M.P.: Detecting deception in reputation management. In: AAMAS 2003, pp. 73–80. ACM, New York (2003)
Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS, vol. (3), pp. 1485–1488 (2008)
Patwardhan, A., et al.: Active Collaborations for Trustworthy Data Management in Ad Hoc Networks. In: Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (November 2005)
Repantis, T., Kalogeraki, V.: Decentralized Trust Management for Ad-hoc Peer-to-peer Networks. In: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad- Hoc Computing (MPAC 2006) in conjunction with MIDDLEWARE 2006 (November 2006)
Su, J., Scott, J., Hui, P., Crowcroft, J., de Lara, E., Diot, C., Goel, A., Lim, M., Upton, E.: Haggle: Seamless networking for mobile applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391–408. Springer, Heidelberg (2007)
Almenárez, F., Marín, A., Díaz, D., Sánchez, J.: Developing a Model for Trust Management in Pervasive Devices. In: Third IEEE International Work-shop on Pervasive Computing and Communication Security (PerSec 2006) held in conjunction with IEEE PerCom 2006 ( March 2006)
Eagle, N., Pentland, A.: Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4(2) (2005)
Miklas, A., Gollu, K., Chan, K., Saroiu, S., Gummadi, K., de Lara, E.: Exploiting so-cialinteractions in mobile systems. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 409–428. Springer, Heidelberg (2007)
Nicolai, T., Yoneki, E., Behrens, N., Kenn, H.: Exploring social context with the wire-less rope. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 874–883. Springer, Heidelberg (2006)
Chang, Y.-J., Liu, H.-H., Chou, L.-D., Chen, Y.-W., Shin, H.-Y.: A General Architecture of Mobile Social Network Services. In: proceedings of the International Conference on Convergence Information Technology, November 21-23, pp. 151–156 (2007)
Tomiyasu, H., Maekawa, T., Hara, T., Nishio, S.: Profile-based Query Routing in a Mobile Social Network. In: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), pp. 105–109 (2006)
Pietiläinen, A.-K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: MobiClique: middleware for mobile social networking. In: Proceedings of the 2nd ACM workshop on Online social networks WOSN in SIGCOMM 2009, pp. 49–54 (2009)
EI Defrawy, K., Solis, J., Tsudik, G.: Leveraging Social Contacts for Mes-sage Confidentiality in Delay Tolerant Networks. In: 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seattle, July 20-24 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qureshi, B., Min, G., Kouvatsos, D. (2010). Opportunistic Trust Based P2P Services Framework for Disconnected MANETs. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)