A Multidimensional Trust Inference Model for the Mobile Ad-Hoc Networks

被引:2
|
作者
Riaz, Muhammad Khalid [1 ]
Fan Yangyu [1 ]
Akhtar, Imran [1 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
来源
2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC) | 2019年
关键词
MANET; Trust based routing; Malicious Nodes; Trust inference model; DSR;
D O I
10.1109/wocc.2019.8770587
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the absence of the central administrator and the dynamic network topology of the Mobile Ad-hoc Networks (MANETS), trust management is a major issue for designing the routing protocols of the network. In this paper, to identify the malicious nodes in the ad-hoc network, a trust inference model based on recommendations is proposed. This multidimensional model is aware of the energy, the channel and history of the interactions between the nodes. The proposed trust model evaluates trust by using two main components: the direct interaction trust (Primary trust) calculated using the Bayesian statistical method and recommendations from the neighbors (secondary trust). The metrics used for calculating the primary trust are: the received signal strength, time of the each interaction, the intimacy of nodes and the frequency of interactions. This trust inference model is implemented on top of the conventional Dynamic Source Routing (DSR) protocol. The results of the simulations affirms that the proposed model enhance effectiveness of routing in existence of malicious peers in the MANETs.
引用
收藏
页码:496 / 500
页数:5
相关论文
共 50 条
  • [31] Cybersecurity of Inference in Vehicular Ad-hoc Networks
    Wang, Zisheng
    Blum, Rick S.
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 138 - 143
  • [32] Trust establishment in pure ad-hoc networks
    Pirzada, A. A.
    McDonald, C.
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (1-2) : 139 - 163
  • [33] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [34] Trust Establishment In Pure Ad-hoc Networks
    A. A. Pirzada
    C. Mcdonald
    Wireless Personal Communications, 2006, 37 : 139 - 168
  • [35] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [36] Improving Trust Management in Ad-hoc Networks
    Shwayat, Doaa
    Shurman, Mohammad
    2024 15TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS, ICICS 2024, 2024,
  • [37] Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks
    Luo, Junhai
    Liu, Xue
    Zhang, Yi
    Ye, Danxia
    Xu, Zhong
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 294 - +
  • [38] Trust-aware anonymous and efficient routing for mobile ad-hoc networks
    Shao, Min-Hua
    Huang, Shin-Jia
    WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 132 - 137
  • [39] A flexible quality of service model for mobile Ad-hoc networks
    Xiao, HN
    Seah, WKG
    Lo, A
    Chua, KC
    2000 IEEE 51ST VEHICULAR TECHNOLOGY CONFERENCE, PROCEEDINGS, VOLS 1-3, 2000, : 445 - 449
  • [40] Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks
    Sathiyavathi, V
    Reshma, R.
    Parvin, S. B. Saleema
    SaiRamesh, L.
    Ayyasamy, A.
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 618 - 625