A trust model based on fuzzy recommendation for mobile ad-hoc networks

被引:95
|
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Fan, Mingyu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mobile ad-hoc network (MANET); Fuzzy recommendation; Packet forwarding; Selfishness;
D O I
10.1016/j.comnet.2009.04.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because mobile nodes are usually constrained by limited energy, bandwidth and computational power, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. Selfish behavior of autonomous network nodes could greatly disrupt network operation and degrade the overall performance of a non-cooperative ad-hoc network. Nodes have to manage the risk involved with the transactions without prior knowledge about each other's reputation. Currently, some methods for trust establishment in MANETs have been proposed based on using cryptographic primitives to address cooperation among nodes attributes and handle selfish behaviors of nodes in MANETs environment. However, these solutions are not always suited to MANETs. The measurement and computation of trust to secure interactions between mobile nodes is crucial for the development of trust mechanisms. The calculation and measurement of trust in unsupervised ad-hoc environment involves complex aspects such as credibility rating for opinions delivered by a node, the honesty of recommendations provided by a mobile node, or the assessment of past experiences with the node one wishes to interact with. The deployment of suitable algorithms and models imitating fuzzy logic can help to solve these problems. In this paper, RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs for the subjective tasks of trust evaluation, packet forwarding review and credibility adjustment. Theoretical analysis and experimental results show that RFSTrust is still robust under more general conditions where selfish nodes cooperate in an attempt to deliberately subvert the system, end-to-end packet delivery ratio more quickly, and decreases the average energy consumes more effectively. The effect of node rating data's sparsity can be greatly reduced and show the excellent performance on typical data set. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2396 / 2407
页数:12
相关论文
共 50 条
  • [1] Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks
    Luo, Junhai
    Liu, Xue
    Zhang, Yi
    Ye, Danxia
    Xu, Zhong
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 294 - +
  • [2] A Multidimensional Trust Inference Model for the Mobile Ad-Hoc Networks
    Riaz, Muhammad Khalid
    Fan Yangyu
    Akhtar, Imran
    2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 496 - 500
  • [3] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [4] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [5] Distributed Trust Based Routing in Mobile Ad-Hoc Networks
    Jain, Shalabh
    Baras, John S.
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1801 - 1807
  • [6] Research of trust model based on fuzzy theory in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Sha, Edwin H-M.
    IET INFORMATION SECURITY, 2014, 8 (02) : 88 - 103
  • [7] Fuzzy Trust Approach for Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, 2008, : 150 - 156
  • [8] Quantifying trust metrics of recommendation systems in ad-hoc networks
    Zhu, Huafei
    Bao, Feng
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2906 - 2910
  • [9] Ternary trust metric for mobile ad-hoc networks
    Anderson, Gus
    Dorsey, David J.
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 89 - 97
  • [10] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032