Trust Evaluation Model Based on Behavior Space Classification for Ad Hoc Networks

被引:1
|
作者
Dudu Samba
机构
基金
中国国家自然科学基金;
关键词
ad hoc networks; trust routing; behavior space; fuzzy integral; System In The Loop (SITL);
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
摘要
Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security.However,trust management frameworks themselves are vulnerable to attacks.Attacks against trust management frameworks are described in this paper with a trust management framework to resist them.The trustworthiness between nodes is evaluated to classify node behavior using a three-dimensional classifier based on a fuzzy integral.Different behaviors are mapped to different behavioral spaces to detect malicious nodes and identify their behavior types.The security of ad hoc networks is then improved by various measures to handle different types of malicious behavior.Simulations of the model on the System In The Loop (SITL) platform show that this trust management framework can separate normal nodes and malicious nodes and can distinguish different types of malicious nodes.
引用
收藏
页码:179 / 185
页数:7
相关论文
共 50 条
  • [1] Dynamic trust evaluation based routing model for ad hoc networks
    Wei, G
    Xiong, ZW
    Li, ZT
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 727 - 730
  • [2] Cluster based trust evaluation in ad hoc networks
    Park, C
    Lee, Y
    Yoon, H
    Jin, S
    Choi, D
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 503 - 507
  • [3] An Individual Behavior-based Trust Routing Model for Ad hoc Networks
    Wang Bo
    Huang Chuanhe
    Yang Wenzhong
    Wang Tong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 454 - 457
  • [4] Route Optimasation Based on Multidimensional Trust Evaluation Model in Mobile Ad hoc Networks
    Shabut, Antesar M.
    Dahal, Keshav
    Awan, Irfan
    Pervez, Zeeshan
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 28 - 34
  • [5] Trust modeling and evaluation in ad hoc networks
    Sun, Y
    Yu, W
    Han, Z
    Liu, KJR
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1862 - 1867
  • [6] On Trust Evaluation in Mobile Ad Hoc Networks
    Dang Quan Nguyen
    Lamont, Louise
    Mason, Peter C.
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 1 - 13
  • [7] A Subjective-trust based Trust Management Model in Ad Hoc Networks
    Hu Zong
    Zhang Yuan
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4876 - +
  • [8] Ad-hoc multi-dimensional trust evaluation model based on classification of service
    Yu, Li
    Qian, Cong
    Liu, Zuhao
    Wang, Ke
    Dai, Bin
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [9] On trust models and trust evaluation metrics for ad hoc networks
    Theodorakopoulos, G
    Baras, JS
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 318 - 328
  • [10] Critical nodes selection based on trust evaluation in Ad Hoc networks
    Liu, Zhuo-Chao
    Yang, Li
    Jiang, Qi
    Wang, Wei
    Cao, Chun-Jie
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 213 - 219