Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

被引:9
|
作者
Xia, Hui [1 ,2 ,3 ]
Yu, Jia [1 ,4 ]
Pan, Zhen-kuan [1 ,2 ]
Cheng, Xiang-guo [1 ,2 ]
Sha, Edwin H. -M. [5 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Qingdao Univ, Postdoctoral Res Stn Syst Sci, Qingdao 266071, Peoples R China
[3] Shandong Univ, Shandong Prov Key Lab Software Engn, Jinan 250101, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[5] Univ Texas Dallas, Dept Comp Sci, Dallas, TX 75083 USA
基金
中国博士后科学基金;
关键词
Mobile ad hoc network; Malicious node; Decentralized trust inference model; Trust-enhanced routing protocol; Data-driven route maintenance mechanism; FUZZY; MODEL;
D O I
10.1007/s11276-015-1094-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of 'trust' into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node's historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node's trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance.
引用
收藏
页码:2239 / 2257
页数:19
相关论文
共 50 条
  • [1] Applying trust enhancements to reactive routing protocols in mobile ad hoc networks
    Hui Xia
    Jia Yu
    Zhen-kuan Pan
    Xiang-guo Cheng
    Edwin H. -M. Sha
    [J]. Wireless Networks, 2016, 22 : 2239 - 2257
  • [2] Analyzing Reactive Routing Protocols for Mobile Ad Hoc Networks
    Kapur, Raj Kamal
    Khatri, Sunil Kumar
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (03)
  • [3] Performance Analysis of Reactive Routing Protocols in Mobile Ad hoc Networks
    Annapurna, Singh
    Shailendra, Mishra
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 141 - 145
  • [4] Performance Analysis of Reactive Routing Protocols in Mobile Ad hoc Networks
    Papadopoulos, Michalis
    Mavromoustakis, Constandinos X.
    Skourletopoulos, Georgios
    Mastorakis, George
    Pallis, Evangelos
    [J]. 2014 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2014, : 104 - 110
  • [5] Enhancing Reactive Ad Hoc Routing Protocols with Trust
    Trofimova, Yelena
    Tvrdik, Pavel
    [J]. FUTURE INTERNET, 2022, 14 (01):
  • [6] Analysis of reactive routing protocols for mobile ad hoc networks in Markov models
    Han-xing Wang
    Xi Hu
    Jian-chao Fang
    Wei-jia Jia
    [J]. Applied Mathematics and Mechanics, 2007, 28 : 127 - 139
  • [7] Analysis of reactive routing protocols for mobile ad hoc networks in Markov models
    王汉兴
    胡细
    方建超
    贾维嘉
    [J]. Applied Mathematics and Mechanics(English Edition), 2007, (01) : 127 - 139
  • [8] Performance Evaluation of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks
    Qian, Manyi
    Huang, Xin
    Tao, Dan
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2018,
  • [9] Analysis of reactive routing protocols for mobile ad hoc networks in Markov models
    Wang Han-xing
    Hu Xi
    Fang Jian-chao
    Jia Wei-jia
    [J]. APPLIED MATHEMATICS AND MECHANICS-ENGLISH EDITION, 2007, 28 (01) : 127 - 139
  • [10] Friendship Based Trust Model to secure routing protocols in Mobile Ad hoc Networks
    Shabut, Antesar M.
    Dahal, Keshav
    Awan, Irfan
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 280 - 287