A NOVEL TRUST ROUTING SCHEME BASED ON NODE BEHAVIOUR EVALUATION FOR MOBILE AD HOC NETWORKS

被引:5
作者
Chen, Hongsong [1 ,3 ]
Fu Zhongchuan [2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150006, Peoples R China
[3] Univ Sci & Technol Beijing, Dept Comp Sci & Technol, Beijing 100083, Peoples R China
关键词
trust routing; AODV; behaviour evaluation; simulation; PROTOCOL;
D O I
10.1080/10798587.2011.10643211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid application and development of mobile ad hoc network, security and trust are important to the network. As the various attack models, we need trust routing scheme to guarantee the security and trust for the network. So trust routing scheme is the main issue in security mobile ad hoc network. As the cooperation character of the network, trust routing is related to node behaviours. A novel trust routing scheme based on node behaviour evaluation is proposed to enhance security of the network. The definition of trust routing is proposed in the paper. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme, Route Reply (RREP) Message is extended to record node behaviour.Ns-2 simulator is used to simulate the trust scheme under different node behaviours and experiment scenarios. Simulation results show that trust routing scheme can improve the security and performance of network effectively.
引用
收藏
页码:1063 / 1074
页数:12
相关论文
共 12 条
[1]  
ALSHURMAN M, 2010, INTELL AUTOM SOFT CO, V16, P591
[2]   A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks [J].
Ayday, E. ;
Fekri, F. .
AD HOC NETWORKS, 2010, 8 (02) :181-192
[3]  
BLAZE M, P 1996 IEEE S SEC PR, P164
[4]   Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol [J].
Chen, Hongsong ;
Ji, Zhenzhou ;
Hu, Mingzeng ;
Fu, Zhongchuan ;
Jiang, Ruixiang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :145-166
[5]  
LACHARITE Y, 2008, IEEE MIL COMM C MILC, P1
[6]  
LIU MS, 2010, 2 INT WORKSH ED TECH, P724
[7]  
Liu Z., 2004, IEEE INT WORKSH FUT, P15
[8]  
RANGARA RR, 2010, 3 IEEE INT C COMP SC, P452
[9]   ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks [J].
Ren, Yonglin ;
Boukerche, Azzedine .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (05) :672-687
[10]  
VELLOSO PB, IEEE S COMP COMM ISC, P102