Recommendation Based Trust Model with an Effective Defence Scheme for MANETs

被引:107
作者
Shabut, Antesar M. [1 ]
Dahal, Keshav P. [2 ]
Bista, Sanat Kumar [3 ]
Awan, Irfan U. [1 ]
机构
[1] Univ Bradford, Sch Engn & Informat, Bradford BD7 1DP, W Yorkshire, England
[2] Univ West Scotland, Sch Comp, Glasgow, Lanark, Scotland
[3] CSIRO Computat Informat, Canberra, ACT, Australia
关键词
Dishonest recommendation; filtering algorithm; mobile ad hoc networks; recommendation attacks; recommendation management; Trust management models; AD; MANAGEMENT; FRAMEWORK; NETWORKS; MOBILITY; ATTACK;
D O I
10.1109/TMC.2014.2374154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that adopts recommendations by other nodes in the network is a challenging problem due to the risk of dishonest recommendations like bad-mouthing, ballot-stuffing, and collusion. This paper investigates the problems related to attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme, which utilises clustering technique to dynamically filter out attacks related to dishonest recommendations between certain time based on number of interactions, compatibility of information and closeness between the nodes. The model is empirically tested under several mobile and disconnected topologies in which nodes experience changes in their neighbourhood leading to frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
引用
收藏
页码:2101 / 2115
页数:15
相关论文
共 37 条
[1]   The node distribution of the random waypoint mobility model for wireless ad hoc networks [J].
Bettstetter, C ;
Resta, G ;
Santi, P .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (03) :257-269
[2]   Self-policing mobile ad hoc networks by reputation systems [J].
Buchegger, S ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) :101-107
[3]  
Buchegger S., 2004, P 2 WORKSH EC P2P SY
[4]   An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network [J].
Cai, Jiwen ;
Yi, Ping ;
Chen, Jialin ;
Wang, Zhiyang ;
Liu, Ning .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :775-780
[5]  
Chandrawanshik K., 2013, INT J COMPUT SCI APP, V3, P51
[6]  
Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1
[7]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[8]  
Crosby GarthV., 2011, International Journal of Network Security, V12, P107
[9]   Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs [J].
Daly, Elizabeth M. ;
Haahr, Mads .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (05) :606-621
[10]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75