Page 56 - Trust in ICT 2017
P. 56

1                                                    Trust in ICT


            in building initial trust bootstrapping, coalition operations without predefined trust, and authentication of
            certificates generated by another party when links are down or ensuring safety before entering a new zone.
            In addition, trust management has diverse applicability in many decision making situations including intrusion
            detection, authentication, access control, key management, isolating misbehaving nodes for effective routing
            and other purposes.
            As shown in Figure 6, trust management, including trust establishment, trust update and trust revocation in
            MANETs is also much more challenging than in traditional centralized environments. For example, collecting
            trust information or evidence to evaluate trustworthiness is difficult due to changes in topology induced by
            node mobility or node failure. Further, resource constraints often confine the trust evaluation process only
            to  local  information.  The  dynamic  nature  and  characteristics  of  MANETs  result  in  uncertainty  and
            incompleteness of the trust evidence, which is continuously changing over time [115].



















                                       Figure 6 – Trust Management Tasks break down

























                          Figure 7 – General Trust Model with Trust Metrics and Technical Attributes

            Due to the unique characteristics of MANET environments and the inherent unreliability of the wireless
            channel, the concept of trust in MANETs should be carefully defined. The main properties of trust in MANET
            environments can be summarized as follows (See Figure 24).
            Although many trust management schemes have been proposed to evaluate trust values, no work clearly
            addresses what should be measured to evaluate network trust. [35] defined trust in their model as reliability,
            timeliness, and integrity of message delivery to the intended next-hop. Also most trust based protocols for
            secure routing calculated trust values based on the characteristics of nodes behaving properly at the network
            layer. Trust measurement can be application dependent and will be different based on the design goals of
            proposed schemes.




            48
   51   52   53   54   55   56   57   58   59   60   61