Team for Research in
Ubiquitous Secure Technology

Using Social Network Theory Towards Development Of Wireless Ad hoc Network Trust
Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry

Citation
Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry. "Using Social Network Theory Towards Development Of Wireless Ad hoc Network Trust". Proceedings of the IEEE 21st International Conference on Advanced Information Networking and Applications, June, 2007.

Abstract
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been recently used in the domain of wireless ad hoc networks. It has been shown that these schemes provide positive results as a self-policing mechanism for the routing of data in wireless ad hoc network security. This paper develops a relationship between the trust concepts in the social network theory and wireless ad hoc networks. In addition, the paper maps existing trust schemes in wireless ad hoc networks to a long-standing theory in social networks. Most importantly, a refined model of trust evaluation in social networks is constructed and mapped to a new trust scheme for ad hoc networks. The new trust scheme is analyzed and shown to outperform existing schemes using scenario and simulation analysis.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry.
    <a href="http://www.truststc.org/pubs/202.html"
    >Using Social Network Theory Towards Development Of
    Wireless Ad hoc Network Trust</a>, Proceedings of the
    IEEE 21st International Conference on Advanced Information
    Networking and Applications, June, 2007.
  • Plain text
    Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry.
    "Using Social Network Theory Towards Development Of
    Wireless Ad hoc Network Trust". Proceedings of the IEEE
    21st International Conference on Advanced Information
    Networking and Applications, June, 2007.
  • BibTeX
    @inproceedings{PaiRoostaWickerSastry07_UsingSocialNetworkTheoryTowardsDevelopmentOfWireless,
        author = {Sameer Pai and Tanya Roosta and Stephen Wicker and
                  Shankar Sastry},
        title = {Using Social Network Theory Towards Development Of
                  Wireless Ad hoc Network Trust},
        booktitle = {Proceedings of the IEEE 21st International
                  Conference on Advanced Information Networking and
                  Applications},
        month = {June},
        year = {2007},
        abstract = {The evolution and existence of stable trust
                  relations have been studied extensively in the
                  context of social theory. However, reputation
                  systems or trust schemes have only been recently
                  used in the domain of wireless ad hoc networks. It
                  has been shown that these schemes provide positive
                  results as a self-policing mechanism for the
                  routing of data in wireless ad hoc network
                  security. This paper develops a relationship
                  between the trust concepts in the social network
                  theory and wireless ad hoc networks. In addition,
                  the paper maps existing trust schemes in wireless
                  ad hoc networks to a long-standing theory in
                  social networks. Most importantly, a refined model
                  of trust evaluation in social networks is
                  constructed and mapped to a new trust scheme for
                  ad hoc networks. The new trust scheme is analyzed
                  and shown to outperform existing schemes using
                  scenario and simulation analysis.},
        URL = {http://www.truststc.org/pubs/202.html}
    }
    

Posted by Sameer Pai on 19 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.