A trust model based on fuzzy recommendation for mobile ad-hoc networks

被引:95
|
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Fan, Mingyu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mobile ad-hoc network (MANET); Fuzzy recommendation; Packet forwarding; Selfishness;
D O I
10.1016/j.comnet.2009.04.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because mobile nodes are usually constrained by limited energy, bandwidth and computational power, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. Selfish behavior of autonomous network nodes could greatly disrupt network operation and degrade the overall performance of a non-cooperative ad-hoc network. Nodes have to manage the risk involved with the transactions without prior knowledge about each other's reputation. Currently, some methods for trust establishment in MANETs have been proposed based on using cryptographic primitives to address cooperation among nodes attributes and handle selfish behaviors of nodes in MANETs environment. However, these solutions are not always suited to MANETs. The measurement and computation of trust to secure interactions between mobile nodes is crucial for the development of trust mechanisms. The calculation and measurement of trust in unsupervised ad-hoc environment involves complex aspects such as credibility rating for opinions delivered by a node, the honesty of recommendations provided by a mobile node, or the assessment of past experiences with the node one wishes to interact with. The deployment of suitable algorithms and models imitating fuzzy logic can help to solve these problems. In this paper, RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs for the subjective tasks of trust evaluation, packet forwarding review and credibility adjustment. Theoretical analysis and experimental results show that RFSTrust is still robust under more general conditions where selfish nodes cooperate in an attempt to deliberately subvert the system, end-to-end packet delivery ratio more quickly, and decreases the average energy consumes more effectively. The effect of node rating data's sparsity can be greatly reduced and show the excellent performance on typical data set. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2396 / 2407
页数:12
相关论文
共 50 条
  • [41] Cluster-Based Trust Model against Attacks in Ad-hoc Networks
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 526 - +
  • [42] A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks
    Beghriche, Abdesselem
    Bilami, Azeddine
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2018, 11 (02) : 309 - 340
  • [43] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [44] Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [45] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [46] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [47] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [48] Actors for mobile ad-hoc networks
    Dedecker, J
    Van Belle, W
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 482 - 494
  • [49] QoS in Mobile Ad-Hoc Networks
    Pushp Sra
    Satish Chand
    Wireless Personal Communications, 2019, 105 : 1599 - 1616
  • [50] QoS in Mobile Ad-Hoc Networks
    Sra, Pushp
    Chand, Satish
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1599 - 1616