Performance Evaluation of Trust-based Collaborative Sanctioning in MANETs

被引:1
|
作者
Seredynski, Marcin [1 ]
Aggoune, Riad [1 ]
Szczypiorski, Krzysztof [2 ]
Khadraoui, Djamel [1 ]
机构
[1] Publ Res Ctr Henri Tudor, Luxembourg, Luxembourg
[2] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
Trust management; collaborative sanctioning; soft security; mobile ad hoc networks; cognitive networks; AD-HOC NETWORKS; COOPERATION;
D O I
10.1109/TrustCom.2013.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Collaborative sanctioning (CS) is necessary in mobile ad hoc networks (MANETs), as cooperation in packet forwarding of network members is crucial. CS provides incentives for good behaviour, hence, it induces nodes with self-regarding preferences to act cooperatively. CS requires nodes to use mechanisms that will evaluate how cooperative are peers requesting forwarding service. In this article we investigate the conditions where the most simple and reliable mechanism based on a trust system is sufficient for CS, from the conditions where it needs to be extended with a reputation system. Using a simple model of MANETs we demonstrate that the basic approach-a trust system that uses personal evidence-if applied by the majority of nodes-results in poor network performance. However, if general evidence is used in addition to the personal one, the performance of the network is relatively good as long as the number of non-cooperative nodes is low. We show that extension of a trust system with a reputation system always improves performance of the network. Nevertheless, the need for a reputation system is strongest when the majority of nodes uses personal evidence.
引用
收藏
页码:81 / 88
页数:8
相关论文
共 50 条
  • [1] Trust-Based Agent Evaluation in Collaborative Systems
    Sheng, Yin
    Hu, Wenting
    Zhu, Xianjun
    [J]. COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 287 - 296
  • [2] A Comparative Performance Analysis of MANETs Routing Protocols in Trust-based models
    Ferdous, Raihana
    Muthukkumarasamy, Vallipuram
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 880 - 885
  • [3] A TRUST-BASED SECURITY ARCHITECTURE FOR TACTICAL MANETS
    Lacharite, Yannick
    Nguyen, Dang Quan
    Wang, Maoyu
    Lamont, Louise
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1227 - 1233
  • [4] Trust-Based Collaborative Filtering
    Department of Computer Science, University College London, London
    WC1E 6BT, United Kingdom
    [J]. IFIP Advances in Information and Communication Technology, 2008, (119-134)
  • [5] Trust-based collaborative filtering
    Lathia, Neal
    Hailes, Stephan
    Capra, Licia
    [J]. TRUST MANAGEMENT II, 2008, 263 : 119 - 134
  • [6] Trust-Based Neural Collaborative Filtering
    Zeng, Yejia
    Qu, Zehui
    [J]. 2019 3RD INTERNATIONAL CONFERENCE ON MACHINE VISION AND INFORMATION TECHNOLOGY (CMVIT 2019), 2019, 1229
  • [7] Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs
    Usha M.S.
    Ravishankar K.C.
    [J]. SN Computer Science, 2021, 2 (4)
  • [8] Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
    Vaseer, Gurveen
    Ghai, Garima
    Ghai, Dhruva
    [J]. 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2018), 2018, : 108 - 113
  • [9] A Trust-Based Scheme against Packet Dropping Attacks in MANETs
    Shah, Sachi N.
    Jhaveri, Rutvij H.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 68 - 75
  • [10] Performance of trust-based governance
    Bart S. Vanneste
    Onesun Steve Yoo
    [J]. Journal of Organization Design, 9