Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks

被引:0
|
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Zhang, Yi [3 ]
Ye, Danxia [1 ]
Xu, Zhong [2 ,4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
[3] Univ Calif Santa Cruz, Sch Engn, Santa Cruz, CA 95064 USA
[4] Northwestern Polytech Univ, Coll Automat, Xian 710072, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) are based on cooperative and trust characteristic of mobile nodes. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANETs are very vulnerable to various attacks. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. In this paper, we propose a fuzzy trust recommendation based on collaborative filtering, which stimulates collaboration among distributed computing and communicating nodes, facilitates the detection of untrustworthy nodes, and assists decision-making in various protocols for MANETs. Due to the uncertain interaction outcomes, we use fuzzy logic to model trust recommendation in a MANET environment. Our trust model combines direct trust and trust recommendation information based on collaborative filtering to allow nodes to represent and reason with uncertainty and imprecise information regarding other nodes' trustworthiness. Simulation results show that the proposed model is flexible and valid.
引用
收藏
页码:294 / +
页数:2
相关论文
共 50 条
  • [21] Computing of trust in ad-hoc networks
    Zhu, Huafei
    Bao, Feng
    Liu, Jianwei
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 1 - 11
  • [22] Research of trust model based on fuzzy theory in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Sha, Edwin H-M.
    IET INFORMATION SECURITY, 2014, 8 (02) : 88 - 103
  • [23] TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
    Balakrishnan, Venkat
    Varadharajan, Vijay
    Tupakula, Uday
    Lucs, Phillip
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 216 - 221
  • [24] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Vishvas Haridas Kshirsagar
    Ashok M. Kanthe
    Dina Simunic
    Wireless Personal Communications, 2018, 100 : 311 - 320
  • [25] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Kshirsagar, Vishvas Haridas
    Kanthe, Ashok M.
    Simunic, Dina
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) : 311 - 320
  • [26] Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)
    Kpodjedo, Segla
    Pierre, Samuel
    Pourzandi, Makan
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 507 - +
  • [27] Trust-based Information Assurance Mechanism for Military Mobile Ad-hoc Networks
    Amanowicz, Marek
    Glowacka, Joanna
    Parobczak, Krzysztof
    Krygier, Jaroslaw
    2014 20TH INTERNATIONAL CONFERENCE ON MICROWAVES, RADAR, AND WIRELESS COMMUNICATION (MIKON), 2014,
  • [28] Enhancing the Reliability of Ad-hoc Networks through Fuzzy Trust Evaluation
    Hallani, H.
    Shahrestani, S. A.
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 93 - +
  • [29] An effective trust establishment scheme for authentication in Mobile Ad-Hoc Networks
    Wang, Guojun
    Wang, Qiong
    Ca, Jiannong
    Guo, Minyi
    2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 749 - +
  • [30] Trust Modeling for Secure Route Discovery in Mobile Ad-hoc Networks
    Wadhwani, Ganesh Kumar
    Khatri, Sunil Kumar
    Muttoo, S. K.
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 391 - 395