Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

被引:122
作者
Wei, Zhexiong [1 ]
Tang, Helen [2 ]
Yu, F. Richard [1 ]
Wang, Maoyu [3 ]
Mason, Peter [2 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[2] Def Res & Dev Canada Ottawa, Ottawa, ON K1A 0K2, Canada
[3] Commun Res Ctr, Ottawa, ON K2H 8S2, Canada
关键词
Mobile ad hoc networks (MANETs); security; trust management; uncertain reasoning; INTRUSION DETECTION; DESIGN;
D O I
10.1109/TVT.2014.2313865
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we propose a unified trust management scheme that enhances the security in MANETs. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation, which is also called secondhand information that is obtained from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory (DST), which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method. By combining these two components in the trust model, we can obtain more accurate trust values of the observed nodes in MANETs. We then evaluate our scheme under the scenario of MANET routing. Extensive simulation results show the effectiveness of the proposed scheme. Specifically, throughput and packet delivery ratio (PDR) can be improved significantly with slightly increased average end-to-end delay and overhead of messages.
引用
收藏
页码:4647 / 4658
页数:12
相关论文
共 44 条
[1]  
Adjih C., 2008, 2 IFIP ANN MED AD HO
[2]  
Albers P., 2002, 1 INT WORKSH WIR INF
[3]  
[Anonymous], 2004, INPROCEEDINGS ACM
[4]  
[Anonymous], 2005, 2 OLSR INT WORKS
[5]  
[Anonymous], 2003, Experimental
[6]  
Bin Yu, 2002, Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, P294
[7]   Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Tang, Helen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (09) :3064-3073
[8]   Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Mason, Peter ;
Tang, Helen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (03) :1025-1036
[9]  
Buchegger Buchegger S. S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
[10]  
Buchegger S., 2004, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, P1