Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks

被引:0
|
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Zhang, Yi [3 ]
Ye, Danxia [1 ]
Xu, Zhong [2 ,4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
[3] Univ Calif Santa Cruz, Sch Engn, Santa Cruz, CA 95064 USA
[4] Northwestern Polytech Univ, Coll Automat, Xian 710072, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) are based on cooperative and trust characteristic of mobile nodes. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANETs are very vulnerable to various attacks. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. In this paper, we propose a fuzzy trust recommendation based on collaborative filtering, which stimulates collaboration among distributed computing and communicating nodes, facilitates the detection of untrustworthy nodes, and assists decision-making in various protocols for MANETs. Due to the uncertain interaction outcomes, we use fuzzy logic to model trust recommendation in a MANET environment. Our trust model combines direct trust and trust recommendation information based on collaborative filtering to allow nodes to represent and reason with uncertainty and imprecise information regarding other nodes' trustworthiness. Simulation results show that the proposed model is flexible and valid.
引用
收藏
页码:294 / +
页数:2
相关论文
共 50 条
  • [1] A trust model based on fuzzy recommendation for mobile ad-hoc networks
    Luo, Junhai
    Liu, Xue
    Fan, Mingyu
    COMPUTER NETWORKS, 2009, 53 (14) : 2396 - 2407
  • [2] Collaborative filtering based on opportunistic information sharing in mobile ad-hoc networks
    de Spindler, Alexandre
    Norrie, Moira C.
    Grossniklaus, Michael
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 408 - 416
  • [3] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [4] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [5] Distributed Trust Based Routing in Mobile Ad-Hoc Networks
    Jain, Shalabh
    Baras, John S.
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1801 - 1807
  • [6] Fuzzy Trust Approach for Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, 2008, : 150 - 156
  • [7] Quantifying trust metrics of recommendation systems in ad-hoc networks
    Zhu, Huafei
    Bao, Feng
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2906 - 2910
  • [8] Ternary trust metric for mobile ad-hoc networks
    Anderson, Gus
    Dorsey, David J.
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 89 - 97
  • [9] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032
  • [10] MobHinter: Epidemic Collaborative Filtering and Self-Organization in Mobile Ad-Hoc Networks
    Schifanella, Rossano
    Panisson, Andre
    Gena, Cristina
    Ruffo, Giancarlo
    RECSYS'08: PROCEEDINGS OF THE 2008 ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2008, : 27 - 34