Novel approach of distributed & adaptive trust metrics for MANET

被引:124
作者
Zhang, De-gan [1 ,2 ,3 ]
Gao, Jin-xin [1 ,2 ]
Liu, Xiao-huan [1 ,2 ]
Zhang, Ting [1 ,2 ]
Zhao, De-xin [1 ,2 ]
机构
[1] Tianjin Univ Technol, Key Lab Comp Vis & Syst, Minist Educ, Tianjin 300384, Peoples R China
[2] Tianjin Univ Technol, Tianjin Key Lab Intelligent Comp & Novel Software, Tianjin 300384, Peoples R China
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
基金
中国国家自然科学基金;
关键词
Mobile Ad hoc Network; Distributed; Adaptive; Trust metrics; Malicious attacks; WIRELESS SENSOR NETWORKS; ALGORITHM; DESIGN;
D O I
10.1007/s11276-019-01955-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.
引用
收藏
页码:3587 / 3603
页数:17
相关论文
共 52 条
  • [1] [Anonymous], APPL INTELLIGENCE
  • [2] [Anonymous], 2012, P IEEE SOPO, DOI DOI 10.1186/1687- 6180-2012-110
  • [3] A survey of trust in computer science and the Semantic Web
    Artz, Donovan
    Gil, Yolanda
    [J]. JOURNAL OF WEB SEMANTICS, 2007, 5 (02): : 58 - 71
  • [4] A trust enhanced secure clustering framework for wireless ad hoc networks
    Chatterjee, Pushpita
    Ghosh, Uttam
    Sengupta, Indranil
    Ghosh, Soumya K.
    [J]. WIRELESS NETWORKS, 2014, 20 (07) : 1669 - 1684
  • [5] Chen C, 2018, MOBILE NETWORKS APPL
  • [6] Capacity of Cooperative Vehicular Networks With Infrastructure Support: Multiuser Case
    Chen, Jieqiong
    Mao, Guoqiang
    Li, Changle
    Liang, Weifa
    Zhang, De-gan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (02) : 1546 - 1560
  • [7] Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1001 - 1012
  • [8] A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
    Feng, Renjian
    Xu, Xiaofeng
    Zhou, Xiang
    Wan, Jiangwen
    [J]. SENSORS, 2011, 11 (02) : 1345 - 1360
  • [9] Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
    Govindan, Kannan
    Mohapatra, Prasant
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 279 - 298
  • [10] Opportunities and Challenges of Wireless Sensor Networks in Smart Grid
    Gungor, Vehbi C.
    Lu, Bin
    Hancke, Gerhard P.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (10) : 3557 - 3564