Trust establishment in cooperative wireless relaying networks

被引:3
作者
Changiz, Reyhaneh [1 ]
Halabian, Hassan [1 ]
Yu, F. Richard [1 ]
Lambadaris, Ioannis [1 ]
Tang, Helen [2 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[2] Def R&D Canada, Network Informat Operat Sect, Ottawa, ON, Canada
关键词
trust establishment; cooperative relaying; Bayesian methodology; SELECTION; STRATEGIES;
D O I
10.1002/wcm.2271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1450 / 1470
页数:21
相关论文
共 40 条
  • [11] Selection cooperation in multi-source cooperative networks
    Beres, Elzbieta
    Adve, Raviraj
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (01) : 118 - 127
  • [12] Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Xiaoping P.
    Mason, Peter
    Tang, Helen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (03) : 1025 - 1036
  • [13] Buchegger S., 2004, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, P1
  • [14] Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs
    Chang, Ben-Jye
    Kuo, Szu-Liang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (04) : 1846 - 1863
  • [15] Changiz R., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P498, DOI 10.1109/EUC.2010.82
  • [16] Trust Establishment in Cooperative Wireless Networks
    Changiz, Reyhaneh
    Halabian, Hassan
    Yu, F. Richard
    Lambadaris, Ioannis
    Tang, Helen
    Mason, Peter C.
    [J]. MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 1074 - 1079
  • [17] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583
  • [18] A stochastic model for misbehaving relays in cooperative diversity
    Dehnie, Sintayehu
    Memon, Nasir
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 482 - +
  • [19] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [20] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888