Trust Model Based on N-Queen-Like for Mobile Ad Hoc Networks Using NS-3

被引:0
作者
Amiruddin [1 ,2 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok 16424, Jawa Barat, Indonesia
[2] Sekolah Tinggi Sandi Negara, Bogor 16120, Jawa Barat, Indonesia
关键词
Ad Hoc Network; Clustering; N-Queen-Like; Security; Trust Model; ALGORITHM;
D O I
10.1166/as1.2015.6580
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Mobile ad hoc networks (MANETS) have become popular and a key communication technology in tactical activities such as the movement of troops and equipment and terrorism combat in military field, and rescue and evacuation during natural disasters. However, threats to MANETS are also increasing. Many approaches or methods were proposed for such a situation. In this work, we developed a trust model utilizing N-Queen-like method for selecting trusted nodes across the entire an ad hoc network. We simulated the trust model by modifying AODV protocol using ns-3. The simulation results show that when the number of nodes >= 10, the number of connected nodes gets 100% that means all the nodes are connected each other, while the number of trusted links >50% and this leads to an increased number of trusted nodes. The increase of the distance thresholds leads to the increase of the connected nodes which reached 100% number of connection when the distance threshold >= 150.
引用
收藏
页码:3541 / 3545
页数:5
相关论文
共 16 条
  • [1] Adali S., 2013, Modeling Trust Context in Networks
  • [2] Trust management in mobile ad hoc networks for bias minimization and application performance maximization
    Chen, Ing-Ray
    Guo, Jia
    Sao, Fenye
    Cho, Jin-Hee
    [J]. AD HOC NETWORKS, 2014, 19 : 59 - 74
  • [3] Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1001 - 1012
  • [4] Harwahyu R, 2014, IEEE ICC, P544, DOI 10.1109/ICC.2014.6883375
  • [5] Distributed Trust Node Selection for Secure Group Communication in MANET
    Jenitha, T.
    Jayashree, P.
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2014, : 179 - 182
  • [6] Rahnamayan S, 2008, CAN CON EL COMP EN, P32
  • [7] Sarkar SK, 2013, AD HOC MOBILE WIRELESS NETWORKS: PRINCIPLES, PROTOCOLS, AND APPLICATIONS, 2ND EDITION, P1, DOI 10.1201/b13094
  • [8] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [9] Sum YL, 2014, IEEE VTS VEH TECHNOL
  • [10] Thouti K., 2012 2 IEEE INT C PA