Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs

被引:6
作者
Sirisala, Nageswararao [1 ]
Bindu, C. Shoba [2 ]
机构
[1] Vardhaman Coll Engn, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] JNTUACE, CSE Dept, Anantapur, Andhra Pradesh, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS (ADCOM) | 2015年
关键词
Fuzzy Logic; Quality of Service; Trust; MANETs; AD HOC NETWORKS; MOBILE; SECURITY;
D O I
10.1109/ADCOM.2015.17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which are capable and cooperative. Node capability is evaluated through the QoS parameters( like energy, bandwidth, link stability) and cooperativeness is measured in terms of reliability. Fuzzy logic is applied to compute the node trust value by considering its quality and reliability metrics. FQTM selects the nodes with higher trust values to construct route from source to destination. The performance of proposed method is presented theoretically (time and space complexities) and experimentally.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 15 条
[1]   Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs [J].
Chang, Ben-Jye ;
Kuo, Szu-Liang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (04) :1846-1863
[2]   MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks [J].
Hao, Fei ;
Min, Geyong ;
Lin, Man ;
Luo, Changqing ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (11) :2944-2955
[3]  
Heiniger R. W., 2000, Proceedings of the 5th International Conference on Precision Agriculture, Bloomington, Minnesota, USA, 16-19 July, 2000, P1
[4]   Trust-enhanced Security in Location-based Adaptive Authentication [J].
Lenzini, Gabriele ;
Bargh, Mortaza S. ;
Hulsebosch, Bob .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) :105-119
[5]   A trust model based on fuzzy recommendation for mobile ad-hoc networks [J].
Luo, Junhai ;
Liu, Xue ;
Fan, Mingyu .
COMPUTER NETWORKS, 2009, 53 (14) :2396-2407
[6]   A review and performance comparison of QoS multicast routing protocols for MANETs [J].
Masoudifar, Mina .
AD HOC NETWORKS, 2009, 7 (06) :1150-1155
[7]  
Shih Kuei-Ping, 2002, IEEE INT C COMM C P
[8]  
Sirisala N, 2014, IEEE GLOB CONF WIREL, P283, DOI 10.1109/GCWCN.2014.7030895
[9]  
Sun BL, 2005, IEEE 2005 INTERNATIONAL SYMPOSIUM ON MICROWAVE, ANTENNA, PROPAGATION AND EMC TECHNOLOGIES FOR WIRELESS COMMUNICATIONS PROCEEDINGS, VOLS 1 AND 2, P1514
[10]   A power-aware multicast routing protocol for mobile ad hoc networks with mobility prediction [J].
Wang, Nen-Chung ;
Chen, Jong-Shin ;
Huang, Yung-Fa ;
Su, Yu-Li .
WIRELESS PERSONAL COMMUNICATIONS, 2007, 43 (04) :1479-1497