A trust model based on fuzzy recommendation for mobile ad-hoc networks

被引:95
|
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Fan, Mingyu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mobile ad-hoc network (MANET); Fuzzy recommendation; Packet forwarding; Selfishness;
D O I
10.1016/j.comnet.2009.04.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because mobile nodes are usually constrained by limited energy, bandwidth and computational power, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. Selfish behavior of autonomous network nodes could greatly disrupt network operation and degrade the overall performance of a non-cooperative ad-hoc network. Nodes have to manage the risk involved with the transactions without prior knowledge about each other's reputation. Currently, some methods for trust establishment in MANETs have been proposed based on using cryptographic primitives to address cooperation among nodes attributes and handle selfish behaviors of nodes in MANETs environment. However, these solutions are not always suited to MANETs. The measurement and computation of trust to secure interactions between mobile nodes is crucial for the development of trust mechanisms. The calculation and measurement of trust in unsupervised ad-hoc environment involves complex aspects such as credibility rating for opinions delivered by a node, the honesty of recommendations provided by a mobile node, or the assessment of past experiences with the node one wishes to interact with. The deployment of suitable algorithms and models imitating fuzzy logic can help to solve these problems. In this paper, RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs for the subjective tasks of trust evaluation, packet forwarding review and credibility adjustment. Theoretical analysis and experimental results show that RFSTrust is still robust under more general conditions where selfish nodes cooperate in an attempt to deliberately subvert the system, end-to-end packet delivery ratio more quickly, and decreases the average energy consumes more effectively. The effect of node rating data's sparsity can be greatly reduced and show the excellent performance on typical data set. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2396 / 2407
页数:12
相关论文
共 50 条
  • [21] Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks
    Lwin, May Thura
    Yim, Jinhyuk
    Ko, Young-Bae
    SENSORS, 2020, 20 (03)
  • [22] A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
    Najafi, Maryam
    Khoukhi, Lyes
    Lemercier, Marc
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 419 - 422
  • [23] A Trust Model for Safe Routing Based on Trust Confidence in Vehicular Ad-Hoc Networks
    Cui, Jianming
    Ma, Liang
    Gao, Shu
    Wang, Ruirui
    CICTP 2020: ADVANCED TRANSPORTATION TECHNOLOGIES AND DEVELOPMENT-ENHANCING CONNECTIONS, 2020, : 424 - 435
  • [24] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)
  • [25] Computing of trust in ad-hoc networks
    Zhu, Huafei
    Bao, Feng
    Liu, Jianwei
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 1 - 11
  • [26] Model Based Adaptive Mobility Prediction in Mobile Ad-Hoc Networks
    Mousavi, S. M.
    Rabiee, H. R.
    Moshref, M.
    Dabirmoghaddam, A.
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1713 - 1716
  • [27] TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
    Balakrishnan, Venkat
    Varadharajan, Vijay
    Tupakula, Uday
    Lucs, Phillip
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 216 - 221
  • [28] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Kshirsagar, Vishvas Haridas
    Kanthe, Ashok M.
    Simunic, Dina
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) : 311 - 320
  • [29] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Vishvas Haridas Kshirsagar
    Ashok M. Kanthe
    Dina Simunic
    Wireless Personal Communications, 2018, 100 : 311 - 320
  • [30] Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)
    Kpodjedo, Segla
    Pierre, Samuel
    Pourzandi, Makan
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 507 - +