首页 | 本学科首页   官方微博 | 高级检索  
     


Applying trust enhancements to reactive routing protocols in mobile ad hoc networks
Authors:Hui Xia  Jia Yu  Zhen-kuan Pan  Xiang-guo Cheng  Edwin H -M Sha
Affiliation:1.College of Information Engineering,Qingdao University,Qingdao,People’s Republic of China;2.Postdoctoral Research Station of System Science,Qingdao University,Qingdao,People’s Republic of China;3.Shandong Provincial Key Laboratory of Software Engineering,Shandong University,Jinan,People’s Republic of China;4.School of Computer and Software,Nanjing University of Information Science and Technology,Nanjing,People’s Republic of China;5.Department of Computer Science,University of Texas,Dallas,USA
Abstract:Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of ‘trust’ into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node’s historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node’s trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号