Trust Evaluation Model Based on Behavior Space Classification for Ad Hoc Networks

被引:1
作者
Dudu Samba
机构
基金
中国国家自然科学基金;
关键词
ad hoc networks; trust routing; behavior space; fuzzy integral; System In The Loop (SITL);
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
Trust management frameworks are used to evaluate and manage trust relationships between network nodes and enhance network security.However,trust management frameworks themselves are vulnerable to attacks.Attacks against trust management frameworks are described in this paper with a trust management framework to resist them.The trustworthiness between nodes is evaluated to classify node behavior using a three-dimensional classifier based on a fuzzy integral.Different behaviors are mapped to different behavioral spaces to detect malicious nodes and identify their behavior types.The security of ad hoc networks is then improved by various measures to handle different types of malicious behavior.Simulations of the model on the System In The Loop (SITL) platform show that this trust management framework can separate normal nodes and malicious nodes and can distinguish different types of malicious nodes.
引用
收藏
页码:179 / 185
页数:7
相关论文
共 50 条
[21]   Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks [J].
Qureshi, Kashif Naseer ;
Nafea, Hanaa ;
Tariq Javed, Ibrahim ;
Zrar Ghafoor, Kayhan .
IEEE ACCESS, 2024, 12 :95390-95401
[22]   Highly reliable trust establishment scheme in ad hoc networks [J].
Ren, K ;
Li, TY ;
Wan, ZG ;
Bao, F ;
Deng, RH ;
Kim, K .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2004, 45 (06) :687-699
[24]   Self-organized public-key management for mobile Ad Hoc Networks based on a bidirectional trust model [J].
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China .
Wuhan Univ J Nat Sci, 2006, 1 (188-192) :188-192
[25]   Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks [J].
Rikli, Nasser-Eddine ;
Alnasser, Aljawharah .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07) :1-16
[26]   Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks [J].
Aburada, Kentaro ;
Yamaba, Hisaaki ;
Kubota, Shinichiro ;
Katayama, Tetsuro ;
Park, Mirang ;
Okazaki, Naonobu .
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2015, 2 (02) :120-124
[27]   Interference Evaluation in CDMA Ad Hoc Networks [J].
Ramos, R. P. ;
Rego, M. Geandre ;
Lopes, Tarciana ;
Baldini Filho, R. ;
de Almeida, C. .
PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, :962-965
[28]   Towards a routing framework in ad hoc space networks [J].
Chen, Chao ;
Chen, Zesheng .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 5 (01) :44-55
[29]   Optimal dense convolutional network model for image classification in unmanned aerial vehicles based ad hoc networks [J].
Punithavathi, I. S. Hephzi ;
Dhanasekaran, S. ;
Duraipandy, P. ;
Lydia, E. Laxmi ;
Sivaram, M. ;
Shankar, K. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 39 (1-2) :46-57
[30]   A novel routing protocol based on an energy model in Ad Hoc Networks [J].
Wang Bo ;
Huang Chuanhe ;
Yang Wenzhong .
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, :2605-2608