A trust model based on fuzzy recommendation for mobile ad-hoc networks

被引:95
作者
Luo, Junhai [1 ,2 ]
Liu, Xue [2 ]
Fan, Mingyu [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mobile ad-hoc network (MANET); Fuzzy recommendation; Packet forwarding; Selfishness;
D O I
10.1016/j.comnet.2009.04.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because mobile nodes are usually constrained by limited energy, bandwidth and computational power, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. Selfish behavior of autonomous network nodes could greatly disrupt network operation and degrade the overall performance of a non-cooperative ad-hoc network. Nodes have to manage the risk involved with the transactions without prior knowledge about each other's reputation. Currently, some methods for trust establishment in MANETs have been proposed based on using cryptographic primitives to address cooperation among nodes attributes and handle selfish behaviors of nodes in MANETs environment. However, these solutions are not always suited to MANETs. The measurement and computation of trust to secure interactions between mobile nodes is crucial for the development of trust mechanisms. The calculation and measurement of trust in unsupervised ad-hoc environment involves complex aspects such as credibility rating for opinions delivered by a node, the honesty of recommendations provided by a mobile node, or the assessment of past experiences with the node one wishes to interact with. The deployment of suitable algorithms and models imitating fuzzy logic can help to solve these problems. In this paper, RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs for the subjective tasks of trust evaluation, packet forwarding review and credibility adjustment. Theoretical analysis and experimental results show that RFSTrust is still robust under more general conditions where selfish nodes cooperate in an attempt to deliberately subvert the system, end-to-end packet delivery ratio more quickly, and decreases the average energy consumes more effectively. The effect of node rating data's sparsity can be greatly reduced and show the excellent performance on typical data set. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2396 / 2407
页数:12
相关论文
共 50 条
  • [31] A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network
    Rao, Meena
    Chaudhary, Parul
    Sheoran, Kavita
    Dhand, Geetika
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (06) : 2794 - 2810
  • [32] A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network
    Meena Rao
    Parul Chaudhary
    Kavita Sheoran
    Geetika Dhand
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2794 - 2810
  • [33] An adaptive low-overhead resource discovery protocol for mobile ad-hoc networks
    Jui-Chi Liang
    Jyh-Cheng Chen
    Tao Zhang
    [J]. Wireless Networks, 2011, 17 : 437 - 452
  • [34] An adaptive low-overhead resource discovery protocol for mobile ad-hoc networks
    Liang, Jui-Chi
    Chen, Jyh-Cheng
    Zhang, Tao
    [J]. WIRELESS NETWORKS, 2011, 17 (02) : 437 - 452
  • [35] Network Design and Performance Analysis of Geographical Routing Protocol in Mobile Ad-Hoc Networks
    Alam, Abu Hasnat Md Riadul
    Khan, Md. Atiqur Rahaman
    Uddin, Jia
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [36] An Innovative Approach For Security On Mobile Ad-Hoc Network
    Hari, Pranav
    Shukla, Vinay Krishna
    Verma, Pushpendra R.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 759 - 765
  • [37] An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
    Sathishkumar Alampalayam
    Anup Kumar
    [J]. Wireless Personal Communications, 2004, 29 : 263 - 281
  • [38] An adaptive and predictive security model for mobile ad hoc networks
    Alampalayam, S
    Kumar, A
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 263 - 281
  • [39] Swarm-Based Routing Protocol Assisted by Weakly Connected Dominating Sets for Mobile Ad-Hoc Networks
    Li, Kuen-Han
    Leu, Jenq-Shiou
    Hosek, Jiri
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04): : 671 - 681
  • [40] A Secure Autonomic Mobile Ad-hoc Network based Trusted Routing Proposal
    Dhanya, K.
    Jeyalakshmi, C.
    Balakumar, A.
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,