Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

被引:122
作者
Wei, Zhexiong [1 ]
Tang, Helen [2 ]
Yu, F. Richard [1 ]
Wang, Maoyu [3 ]
Mason, Peter [2 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[2] Def Res & Dev Canada Ottawa, Ottawa, ON K1A 0K2, Canada
[3] Commun Res Ctr, Ottawa, ON K2H 8S2, Canada
关键词
Mobile ad hoc networks (MANETs); security; trust management; uncertain reasoning; INTRUSION DETECTION; DESIGN;
D O I
10.1109/TVT.2014.2313865
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we propose a unified trust management scheme that enhances the security in MANETs. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation, which is also called secondhand information that is obtained from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory (DST), which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method. By combining these two components in the trust model, we can obtain more accurate trust values of the observed nodes in MANETs. We then evaluate our scheme under the scenario of MANET routing. Extensive simulation results show the effectiveness of the proposed scheme. Specifically, throughput and packet delivery ratio (PDR) can be improved significantly with slightly increased average end-to-end delay and overhead of messages.
引用
收藏
页码:4647 / 4658
页数:12
相关论文
共 44 条
[41]   A Survey of Trust and Reputation Management Systems in Wireless Communications [J].
Yu, Han ;
Shen, Zhiqi ;
Miao, Chunyan ;
Leung, Cyril ;
Niyato, Dusit .
PROCEEDINGS OF THE IEEE, 2010, 98 (10) :1755-1772
[42]   AOS: an anonymous overlay system for mobile ad hoc networks [J].
Zhang, Rui ;
Zhang, Yanchao ;
Fang, Yuguang .
WIRELESS NETWORKS, 2011, 17 (04) :843-859
[43]   Securing mobile ad hoc networks with certificateless public keys [J].
Zhang, Yanchao ;
Liu, Wei ;
Lou, Wenjing ;
Fang, Yuguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :386-399
[44]  
Zouridaki C., 2005, Proc. the 3rd ACM workshop on Security of ad hoc and sensor networks, P1, DOI DOI 10.1145/1102219.1102222