Node Trust Assessment and Prediction in Mobile Ad Hoc Networks

被引:0
|
作者
Zhou, Shaojie [1 ]
Xia, Hui [2 ,3 ,4 ]
机构
[1] Harbin Univ Sci & Technol, Sch Measurement Control Technol & Commun Engn, Harbin 150080, Peoples R China
[2] Qingdao Univ, Postdoctoral Res Stn Syst Sci, Qingdao 266071, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan 250101, Peoples R China
[4] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
关键词
ad hoc network; malicious attack; prediction trust; trust assessment; improved grey model; Markov chain;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is an inherent reliance on collaboration among the participants of mobile ad hoc networks in order to achieve the aimed functionalities. Collaboration is productive only if all participants operate in an honest manner. However, this is not always the case and these networks are subjected to a variety of malicious attacks. One of the key factors to ensure high communication quality is an efficient assessment scheme for node's prediction trust, to choose potential cooperative nodes and reduce the probability of risk occurrence for next interaction. In this paper, firstly we propose a node's trust assessment model based on node's historical behaviors, in which the trust decision factors include the subjective reputation and indirect reputation. Then we try to combine an improved grey model with the Markov chain together to effectively predict the node's trust. Experiment has been conducted to evaluate the effectiveness of the proposed mechanism.
引用
收藏
页码:361 / 371
页数:11
相关论文
共 50 条
  • [41] Trust metric routing in mobile wireless ad hoc networks
    Winjum, E
    Kure, O
    Spilling, P
    5th World Wireless Congress, Proceedings, 2004, : 552 - 557
  • [42] Ternary trust metric for mobile ad-hoc networks
    Anderson, Gus
    Dorsey, David J.
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 89 - 97
  • [43] Byzantine robust trust establishment for mobile ad hoc networks
    Charikleia Zouridaki
    Brian L. Mark
    Marek Hejmo
    Telecommunication Systems, 2007, 35 : 189 - 206
  • [44] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370
  • [45] cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks
    Zhao, Huanyu
    Yang, Xin
    Li, Xiaolin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (06) : 2792 - 2806
  • [46] Weighted Clustering Trust Model for Mobile Ad Hoc Networks
    M. Ashwin
    S. Kamalraj
    Mubarakali Azath
    Wireless Personal Communications, 2017, 94 : 2203 - 2212
  • [47] Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks
    Cheng, Ningning
    Govindan, Kannan
    Mohapatra, Prasant
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [48] Byzantine robust trust establishment for mobile ad hoc networks
    Zouridaki, Charikleia
    Mark, Brian L.
    Hejmo, Marek
    TELECOMMUNICATION SYSTEMS, 2007, 35 (3-4) : 189 - 206
  • [49] Trust Based Monitoring Approach for Mobile Ad Hoc Networks
    Battat, Nadia
    Makhoul, Abdallah
    Kheddouci, Hamamache
    Medjahed, Sabrina
    Aitouazzoug, Nadia
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2017, 2017, 10517 : 55 - 62
  • [50] Assessing Node Trustworthiness through Adaptive Trust Threshold for Secure Routing in Mobile Ad Hoc Networks
    Reddy, M. Venkata Krishna
    Srinivas, P. V. S.
    Mohan, M. Chandra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 224 - 231