A Multidimensional Trust Inference Model for the Mobile Ad-Hoc Networks
被引:2
|
作者:
Riaz, Muhammad Khalid
论文数: 0引用数: 0
h-index: 0
机构:
Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R ChinaNorthwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
Riaz, Muhammad Khalid
[1
]
Fan Yangyu
论文数: 0引用数: 0
h-index: 0
机构:
Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R ChinaNorthwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
Fan Yangyu
[1
]
Akhtar, Imran
论文数: 0引用数: 0
h-index: 0
机构:
Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R ChinaNorthwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
Akhtar, Imran
[1
]
机构:
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
来源:
2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC)
|
2019年
关键词:
MANET;
Trust based routing;
Malicious Nodes;
Trust inference model;
DSR;
D O I:
10.1109/wocc.2019.8770587
中图分类号:
TP3 [计算技术、计算机技术];
学科分类号:
0812 ;
摘要:
Due to the absence of the central administrator and the dynamic network topology of the Mobile Ad-hoc Networks (MANETS), trust management is a major issue for designing the routing protocols of the network. In this paper, to identify the malicious nodes in the ad-hoc network, a trust inference model based on recommendations is proposed. This multidimensional model is aware of the energy, the channel and history of the interactions between the nodes. The proposed trust model evaluates trust by using two main components: the direct interaction trust (Primary trust) calculated using the Bayesian statistical method and recommendations from the neighbors (secondary trust). The metrics used for calculating the primary trust are: the received signal strength, time of the each interaction, the intimacy of nodes and the frequency of interactions. This trust inference model is implemented on top of the conventional Dynamic Source Routing (DSR) protocol. The results of the simulations affirms that the proposed model enhance effectiveness of routing in existence of malicious peers in the MANETs.