An Individual Behavior-based Trust Routing Model for Ad hoc Networks

被引:1
|
作者
Wang Bo [1 ]
Huang Chuanhe [1 ]
Yang Wenzhong [1 ]
Wang Tong [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
关键词
trust; security; ad hoc networks; routing protocol;
D O I
10.1109/MINES.2009.223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network that try to disrupt, distort or disturb the network traffic. So, this paper defines the method of the trust value computation associated with the behaviors of communication with its one-hop neighbor nodes reliably, timely, and integrally. After using a trust graph theoretic, we establish a trust routing model to evaluate and maintain trust relationships from the aspects of direct and indirect trust level to discover a most trustworthy routing. The simulation shows that the proposed model and algorithm can detect effectively malicious behaviors, bypass the malicious nodes, so as to improve the network packet delivery fraction, routing overhead and decrease the average end-to-end delay.
引用
收藏
页码:454 / 457
页数:4
相关论文
共 50 条
  • [41] Context sensitive trust based geographic opportunistic routing in mobile ad hoc networks
    Rajesh, A.
    Kumar, N. Mohan
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (11): : 1261 - 1274
  • [42] DSR performance improvement in ad-hoc networks using a behavior-based architecture
    Martínez-Alfaro, H
    Cervantes-Casillas, GP
    Vargas-Rosales, C
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3032 - 3037
  • [43] A Cluster-Based Trust Model for Mobile Ad hoc Networks
    Chen Aiguo
    Xu Guoai
    Yang Yixian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4578 - 4581
  • [44] Trust in ad hoc networks: A new model based on clustering algorithm
    Mansouri, Ali
    Bouhlel, Mohamed Salim
    International Journal of Network Security, 2019, 21 (03): : 483 - 493
  • [45] Cooperative communications based on trust model for mobile ad hoc networks
    Wang, K.
    Wu, M.
    IET INFORMATION SECURITY, 2010, 4 (02) : 68 - 79
  • [46] Regression-based trust model for mobile ad hoc networks
    Venkataraman, R.
    Pushpalatha, M.
    Rao, T. Rama
    IET INFORMATION SECURITY, 2012, 6 (03) : 131 - 140
  • [47] A novel routing protocol based on an energy model in Ad Hoc Networks
    Wang Bo
    Huang Chuanhe
    Yang Wenzhong
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2605 - 2608
  • [48] ComplexIoT: Behavior-Based Trust For IoT Networks
    Haefner, Kyle
    Ray, Indrakshi
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 56 - 65
  • [49] Secure anonymous routing in trust and clustered wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    Chen, Zhide
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 488 - 492
  • [50] Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
    Shao, Min-Hua
    Huang, Shin-Jia
    PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 335 - 341