Node Trust Assessment and Prediction in Mobile Ad Hoc Networks

被引:0
|
作者
Zhou, Shaojie [1 ]
Xia, Hui [2 ,3 ,4 ]
机构
[1] Harbin Univ Sci & Technol, Sch Measurement Control Technol & Commun Engn, Harbin 150080, Peoples R China
[2] Qingdao Univ, Postdoctoral Res Stn Syst Sci, Qingdao 266071, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan 250101, Peoples R China
[4] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
关键词
ad hoc network; malicious attack; prediction trust; trust assessment; improved grey model; Markov chain;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is an inherent reliance on collaboration among the participants of mobile ad hoc networks in order to achieve the aimed functionalities. Collaboration is productive only if all participants operate in an honest manner. However, this is not always the case and these networks are subjected to a variety of malicious attacks. One of the key factors to ensure high communication quality is an efficient assessment scheme for node's prediction trust, to choose potential cooperative nodes and reduce the probability of risk occurrence for next interaction. In this paper, firstly we propose a node's trust assessment model based on node's historical behaviors, in which the trust decision factors include the subjective reputation and indirect reputation. Then we try to combine an improved grey model with the Markov chain together to effectively predict the node's trust. Experiment has been conducted to evaluate the effectiveness of the proposed mechanism.
引用
收藏
页码:361 / 371
页数:11
相关论文
共 50 条
  • [21] Stimulating Node Cooperation in Mobile Ad hoc Networks
    Jamal N. Al-Karaki
    Ahmed E. Kamal
    Wireless Personal Communications, 2008, 44 : 219 - 239
  • [22] Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks
    Umeda, Sayaka
    Takeda, Sonoko
    Shigeno, Hiroshi
    2015 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2015, : 143 - 148
  • [23] Secure node misbehaviors in mobile ad hoc networks
    Chigan, CX
    Bandaru, R
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4730 - 4734
  • [24] Multifold node authentication in mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (12) : 1391 - 1406
  • [25] Enhancement of node connectivity for mobile ad hoc networks
    Shi, Xiyu
    Li, Fanzhi
    Adams, Christopher
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS, 2006, 6250
  • [26] Reliable Node Clustering for Mobile Ad Hoc Networks
    Wang, Tao
    Hung, William N. N.
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [27] Stimulating node cooperation in mobile ad hoc networks
    Al-Karaki, Jamal N.
    Kamal, Ahmed E.
    WIRELESS PERSONAL COMMUNICATIONS, 2008, 44 (02) : 219 - 239
  • [28] Invulnerability Assessment for Mobile Ad Hoc Networks
    Jin, Cong
    Jin, Shu-Wei
    2008 WORKSHOP ON POWER ELECTRONICS AND INTELLIGENT TRANSPORTATION SYSTEM, PROCEEDINGS, 2008, : 48 - +
  • [29] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [30] A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
    Sen, Jaydip
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 538 - 547