Novel approach of distributed & adaptive trust metrics for MANET

被引:124
|
作者
Zhang, De-gan [1 ,2 ,3 ]
Gao, Jin-xin [1 ,2 ]
Liu, Xiao-huan [1 ,2 ]
Zhang, Ting [1 ,2 ]
Zhao, De-xin [1 ,2 ]
机构
[1] Tianjin Univ Technol, Key Lab Comp Vis & Syst, Minist Educ, Tianjin 300384, Peoples R China
[2] Tianjin Univ Technol, Tianjin Key Lab Intelligent Comp & Novel Software, Tianjin 300384, Peoples R China
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
中国国家自然科学基金;
关键词
Mobile Ad hoc Network; Distributed; Adaptive; Trust metrics; Malicious attacks; WIRELESS SENSOR NETWORKS; ALGORITHM; DESIGN;
D O I
10.1007/s11276-019-01955-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.
引用
收藏
页码:3587 / 3603
页数:17
相关论文
共 50 条
  • [31] Adaptive Distributed Multicast Routing Protocol for MANET based on Greedy Set Cover
    Wang Ji-Lu
    Zhao Li-Ru
    Dai Wan-Zhou
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 574 - +
  • [32] Adaptive and Distributed TDMA Scheduling Protocol for mobile ad hoc networks (MANET)
    Asgharian, Hamed
    Amirshahi, Bita
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 938 - 942
  • [33] A Novel Adaptive Bio-Inspired Clustered Routing for MANET
    Santhiya, K. G.
    Arumugam, N.
    INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 : 711 - 717
  • [34] The Generalization of Information Entropy to MANET Metrics
    Cerasoli, Carmen
    Dimarogonas, James
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1834 - 1842
  • [35] Quality Assurance Metrics for MANET Evaluation
    Kush, Ashwani
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [36] Trust assessment: a personalized, distributed, and secure approach
    Carchiolo, Vincenza
    Longheu, Alessandro
    Malgeri, Michele
    Mangioni, Giuseppe
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (06): : 605 - 617
  • [37] A trust-region approach with novel filter adaptive radius for system of nonlinear equations
    Kimiaei, Morteza
    Esmaeili, Hamid
    NUMERICAL ALGORITHMS, 2016, 73 (04) : 999 - 1016
  • [38] A trust-region approach with novel filter adaptive radius for system of nonlinear equations
    Morteza Kimiaei
    Hamid Esmaeili
    Numerical Algorithms, 2016, 73 : 999 - 1016
  • [39] A novel approach for mitigating gray hole attack in MANET
    Gurung, Shashi
    Chauhan, Siddhartha
    WIRELESS NETWORKS, 2018, 24 (02) : 565 - 579
  • [40] A novel approach for mitigating gray hole attack in MANET
    Shashi Gurung
    Siddhartha Chauhan
    Wireless Networks, 2018, 24 : 565 - 579