Secure trust metadata management for mobile ad-hoc networks

Vivek Natarajan, Yi Yang, Sencun Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Trust metadata created by individual nodes, based on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure semantics-aware trust metadata management scheme to partition and store an information network of trust metadata of nodes in a MANET. That is, trust metadata is securely propagated to and stored at certain geographic locations inside the network itself, based on its semantics. The TA can send queries of various types in the network to obtain the trust metadata of its interest. This scheme is robust to several security attacks that attempt to disrupt the availability of trust metadata in the network. Our analysis shows that the proposed scheme provides desirable security and functionality properties with low query overhead.

Original languageEnglish (US)
Title of host publicationInformation Systems Security - 8th International Conference, ICISS 2012, Proceedings
Number of pages17
StatePublished - 2012
Event8th International Conference on Information Systems Security, ICISS 2012 - Guwahati, India
Duration: Dec 15 2012Dec 19 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7671 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other8th International Conference on Information Systems Security, ICISS 2012

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Secure trust metadata management for mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this