Trust management in mobile ad hoc networks for bias minimization and application performance maximization

被引:34
作者
Chen, Ing-Ray [1 ]
Guo, Jia [1 ]
Sao, Fenye [1 ]
Cho, Jin-Hee [2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Falls Church, VA 22043 USA
[2] US Army Res Lab, Computat & Informat Sci Directorate, Adelphi, MD USA
关键词
Trust management; Mobile ad hoc networks; Trust bias minimization; Model-based analysis; Application-level trust optimization; Reliability assessment; ADMISSION CONTROL ALGORITHMS; FORWARDING STRATEGIES; LOCATION MANAGEMENT; WIRELESS; OPTIMIZATION; RELIABILITY; SOFTWARE; SYSTEM; COST;
D O I
10.1016/j.adhoc.2014.02.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximization. By means of a novel model-based approach to model the ground truth status of mobile nodes in MANETs as the basis for design validation, we identify and validate the best trust protocol settings under which trust bias is minimized and application performance is maximized. We demonstrate the effectiveness of our approach with an integrated social and quality-of-service (QoS) trust protocol (called SQTrust) with which we identify the best trust aggregation setting under which trust bias is minimized despite the presence of malicious nodes performing slandering attacks. Furthermore, using a mission-oriented mobile group utilizing SQTrust, we identity the best trust formation protocol setting under which the application performance in terms of the system reliability of the mission-oriented mobile group is maximized. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:59 / 74
页数:16
相关论文
共 75 条
[1]  
Adams WJ, 2007, INT FED INFO PROC, V238, P91
[2]  
Aivaloglou E, 2006, LECT NOTES COMPUT SC, V4347, P179
[3]   Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks [J].
Al-Hamadi, Hamid ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2013, 10 (02) :189-203
[4]  
[Anonymous], P 3 INT C NETW SERV
[5]   An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks [J].
Ayday, Erman ;
Fekri, Faramarz .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (09) :1514-1531
[6]  
Bao F., 2012, IEEE Transactions on Network and Service Management, V9, P161
[7]  
Bastani F. B., 1994, Annual Reliability and Maintainability Symposium. 1994 Proceedings (Cat. No.94CH3391-0), P442, DOI 10.1109/RAMS.1994.291149
[8]  
Bengtsson LE., 2012, J SENSOR TECHNOL, V2, P177, DOI DOI 10.4236/JST.2012.24025
[9]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[10]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828