An Individual Behavior-based Trust Routing Model for Ad hoc Networks

被引:1
|
作者
Wang Bo [1 ]
Huang Chuanhe [1 ]
Yang Wenzhong [1 ]
Wang Tong [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
关键词
trust; security; ad hoc networks; routing protocol;
D O I
10.1109/MINES.2009.223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network that try to disrupt, distort or disturb the network traffic. So, this paper defines the method of the trust value computation associated with the behaviors of communication with its one-hop neighbor nodes reliably, timely, and integrally. After using a trust graph theoretic, we establish a trust routing model to evaluate and maintain trust relationships from the aspects of direct and indirect trust level to discover a most trustworthy routing. The simulation shows that the proposed model and algorithm can detect effectively malicious behaviors, bypass the malicious nodes, so as to improve the network packet delivery fraction, routing overhead and decrease the average end-to-end delay.
引用
收藏
页码:454 / 457
页数:4
相关论文
共 50 条
  • [31] Ad hoc network routing based on incomplete trust
    Candolin, C
    Kari, HH
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 300 - 304
  • [32] Mitigating routing misbehaviors using subjective trust model in mobile ad hoc networks
    Vasantha, V.
    Manimegalai, D.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 418 - 423
  • [33] A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks
    Griffiths, Nathan
    Jhumka, Arshad
    Dawson, Anthony
    Myers, Richard
    INTELLIGENT DISTRIBUTED COMPUTING, SYSTEMS AND APPLICATIONS, 2008, 162 : 105 - 114
  • [34] Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks
    Umeda, Sayaka
    Takeda, Sonoko
    Shigeno, Hiroshi
    2015 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2015, : 143 - 148
  • [35] Trust-based on-demand multipath routing in mobile ad hoc networks
    Li, X.
    Jia, Z.
    Zhang, P.
    Zhang, R.
    Wang, H.
    IET INFORMATION SECURITY, 2010, 4 (04) : 212 - 232
  • [36] A Trust-based Stable Routing Protocol in Vehicular ad-hoc Networks
    Ma, Junxia
    Yang, Chen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 107 - 116
  • [37] Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks
    Sathiyavathi, V
    Reshma, R.
    Parvin, S. B. Saleema
    SaiRamesh, L.
    Ayyasamy, A.
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 618 - 625
  • [38] Context sensitive trust based geographic opportunistic routing in mobile ad hoc networks
    A Rajesh
    N Mohan Kumar
    Sādhanā, 2016, 41 : 1261 - 1274
  • [39] Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks
    Peng, Sancheng
    Jia, Weijia
    Wang, Guojun
    Wu, Jie
    Guo, Minyi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 510 - 517
  • [40] A Secure Trust-Based Location-Aided Routing for Ad Hoc Networks
    Wang, Kun
    Wu, Meng
    Xia, Pengrui
    Shen, Subin
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 793 - 797