Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile AD HOC Networks
IUP Journal of Computer Sciences, Vol. XI, No. 2, pp. 7-28. April 2017
23 Pages Posted: 10 Jun 2017 Last revised: 12 Jun 2017
There are 3 versions of this paper
Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile AD HOC Networks
Quantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile Ad Hoc Networks
Date Written: April 1, 2017
Abstract
Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. The recent spate of national and global high-impact cyber security compromises threats, vulnerabilities and exposures leads to fundamental questioning of trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing distrust. It is, therefore, necessary to understand the current state of trust and trust management modeling and implementation in the most high security environments such as in defense and space. Such understanding can serve as a foundation for modeling, design and implementation of next-generation mobile wireless networks for other high security environments such as in banking and finance. This study attempts to understand how trust and trust management are being modeled for the next-generation wireless communication systems (NIST) such as autonomous self-discovering, self-organizing and self-adaptive mobile ad hoc networks. Within the context of Network-Centric Operations (NCO), the paper examines (i) the capabilities of next-generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile ad hoc networks; and (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks. US Army Research Laboratory (ARL) Computational and Information Sciences Directorate’s Network Science research program on wireless mobile ad hoc networks is the focus of the case study.
Keywords: Wireless mobile ad hoc networks, Network security, Trust management protocols, Trust and Trust management modeling, Trust and trust management metrics
JEL Classification: C00, C01, C02, C18, C5, C54, C57, C61, C70, C71, C72, D7, D74, D8, D81, D82, D83, D85, D87, L14, L8,
Suggested Citation: Suggested Citation