A Multidimensional Trust Inference Model for the Mobile Ad-Hoc Networks

被引:2
|
作者
Riaz, Muhammad Khalid [1 ]
Fan Yangyu [1 ]
Akhtar, Imran [1 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
关键词
MANET; Trust based routing; Malicious Nodes; Trust inference model; DSR;
D O I
10.1109/wocc.2019.8770587
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the absence of the central administrator and the dynamic network topology of the Mobile Ad-hoc Networks (MANETS), trust management is a major issue for designing the routing protocols of the network. In this paper, to identify the malicious nodes in the ad-hoc network, a trust inference model based on recommendations is proposed. This multidimensional model is aware of the energy, the channel and history of the interactions between the nodes. The proposed trust model evaluates trust by using two main components: the direct interaction trust (Primary trust) calculated using the Bayesian statistical method and recommendations from the neighbors (secondary trust). The metrics used for calculating the primary trust are: the received signal strength, time of the each interaction, the intimacy of nodes and the frequency of interactions. This trust inference model is implemented on top of the conventional Dynamic Source Routing (DSR) protocol. The results of the simulations affirms that the proposed model enhance effectiveness of routing in existence of malicious peers in the MANETs.
引用
收藏
页码:496 / 500
页数:5
相关论文
共 50 条
  • [1] A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
    Najafi, Maryam
    Khoukhi, Lyes
    Lemercier, Marc
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 419 - 422
  • [2] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [3] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [4] A trust model based on fuzzy recommendation for mobile ad-hoc networks
    Luo, Junhai
    Liu, Xue
    Fan, Mingyu
    COMPUTER NETWORKS, 2009, 53 (14) : 2396 - 2407
  • [5] Ternary trust metric for mobile ad-hoc networks
    Anderson, Gus
    Dorsey, David J.
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 89 - 97
  • [6] A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks
    Griffiths, Nathan
    Jhumka, Arshad
    Dawson, Anthony
    Myers, Richard
    INTELLIGENT DISTRIBUTED COMPUTING, SYSTEMS AND APPLICATIONS, 2008, 162 : 105 - 114
  • [7] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [8] Connectivity Model for Mobile Ad-Hoc Networks
    Bruun, Rasmus Liborius
    Voulgaris, Konstantinos
    Pedersen, Troels
    2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022,
  • [9] Trust Integrated Cooperation Architecture for mobile ad-hoc networks
    Balakrishnan, Venkat
    Varadharajan, Vijay
    Tupakula, Uday
    Lucs, Phillip
    2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 607 - 611
  • [10] Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
    Shao, Min-Hua
    Huang, Shin-Jia
    PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 335 - 341