Skip to main content
Erschienen in: Wireless Networks 7/2016

01.10.2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

verfasst von: Hui Xia, Jia Yu, Zhen-kuan Pan, Xiang-guo Cheng, Edwin H. -M. Sha

Erschienen in: Wireless Networks | Ausgabe 7/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of ‘trust’ into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node’s historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node’s trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 14(2), 279–298.CrossRef Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 14(2), 279–298.CrossRef
2.
Zurück zum Zitat Li, W., Parker, J., & Joshi, A. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.CrossRef Li, W., Parker, J., & Joshi, A. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.CrossRef
3.
Zurück zum Zitat Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Performance Evaluation, 65(2), 99–128.CrossRef Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Performance Evaluation, 65(2), 99–128.CrossRef
4.
Zurück zum Zitat Onolaja, O., Bahsoon, R., & Theodoropoulos, G. (2011). Trust dynamics: A data-driven simulation approach. Trust Management V, 358, 323–334. Onolaja, O., Bahsoon, R., & Theodoropoulos, G. (2011). Trust dynamics: A data-driven simulation approach. Trust Management V, 358, 323–334.
5.
Zurück zum Zitat Zhang, F., Jia, Z., Xia, H., Li, X., & Sha, E. (2012). Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1,1) model. Computer Communications, 35(5), 589–596.CrossRef Zhang, F., Jia, Z., Xia, H., Li, X., & Sha, E. (2012). Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1,1) model. Computer Communications, 35(5), 589–596.CrossRef
6.
Zurück zum Zitat Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef
7.
Zurück zum Zitat Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET-Information Security, 6(2), 77–83.CrossRef Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET-Information Security, 6(2), 77–83.CrossRef
8.
Zurück zum Zitat Eissa, T., Razak, S., & Khokhar, R. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications, 18(5), 666–677.CrossRef Eissa, T., Razak, S., & Khokhar, R. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications, 18(5), 666–677.CrossRef
9.
Zurück zum Zitat Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36(9), 1078–1093.CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36(9), 1078–1093.CrossRef
10.
Zurück zum Zitat Cho, J., & Chen, I. (2013). On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks, 11(8), 2217–2234.CrossRef Cho, J., & Chen, I. (2013). On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks, 11(8), 2217–2234.CrossRef
11.
Zurück zum Zitat Mohanapriya, M., & Krishnamurthi, I. (2014). Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arabian Journal for Science and Engineering, 39(3), 1825–1833.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arabian Journal for Science and Engineering, 39(3), 1825–1833.CrossRef
12.
Zurück zum Zitat Xia, H., Jia, Z., & Sha, E. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET-Information Security, 8(2), 88–103.CrossRef Xia, H., Jia, Z., & Sha, E. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET-Information Security, 8(2), 88–103.CrossRef
13.
Zurück zum Zitat Mitchell, R., & Chen, I. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.CrossRef Mitchell, R., & Chen, I. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.CrossRef
15.
Zurück zum Zitat Wu, Gin-Der, & Zhu, Zhen-Wei. (2014). An enhanced discriminability recurrent fuzzy neural network for temporal classification problems. Fuzzy Sets and Systems, 237, 47–62.MathSciNetCrossRefMATH Wu, Gin-Der, & Zhu, Zhen-Wei. (2014). An enhanced discriminability recurrent fuzzy neural network for temporal classification problems. Fuzzy Sets and Systems, 237, 47–62.MathSciNetCrossRefMATH
16.
Zurück zum Zitat Zhang, L. X., & Lam, J. (2010). Necessary and sufficient conditions for analysis and synthesis of Markov jump linear systems with incomplete transition descriptions. IEEE Transactions on Automatic Control, 55(7), 1695–1701.MathSciNetCrossRef Zhang, L. X., & Lam, J. (2010). Necessary and sufficient conditions for analysis and synthesis of Markov jump linear systems with incomplete transition descriptions. IEEE Transactions on Automatic Control, 55(7), 1695–1701.MathSciNetCrossRef
17.
Zurück zum Zitat Xie, Y. H., Hu, J. K., Xiang, Y. H., Yu, S., Tang, S. S., & Wang, Y. (2013). Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1807–1817.CrossRef Xie, Y. H., Hu, J. K., Xiang, Y. H., Yu, S., Tang, S. S., & Wang, Y. (2013). Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1807–1817.CrossRef
18.
Zurück zum Zitat Marina, M. K. & Das, S. R.(2001). On-demand multipath distance vector routing for ad hoc networks. In Proceedings of international conference on network protocols, Riverside, CA, USA (pp. 11–14). November 2001. Marina, M. K. & Das, S. R.(2001). On-demand multipath distance vector routing for ad hoc networks. In Proceedings of international conference on network protocols, Riverside, CA, USA (pp. 11–14). November 2001.
19.
Zurück zum Zitat Manvi, S. S., & Kakkasageri, M. S. (2008). Multicast routing in mobile ad hoc networks by using a multiagent system. Information Sciences, 178(6), 1611–1628.MathSciNetCrossRef Manvi, S. S., & Kakkasageri, M. S. (2008). Multicast routing in mobile ad hoc networks by using a multiagent system. Information Sciences, 178(6), 1611–1628.MathSciNetCrossRef
21.
Zurück zum Zitat Shen, J., Tan, H. W., Wang, J., Wang, J. W., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178. Shen, J., Tan, H. W., Wang, J., Wang, J. W., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.
22.
Zurück zum Zitat Xie, S. D., & Wang, Y. X. (2014). Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, 78(1), 231–246.CrossRef Xie, S. D., & Wang, Y. X. (2014). Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, 78(1), 231–246.CrossRef
23.
Zurück zum Zitat Chen, I. R., Bao, F. Y., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef Chen, I. R., Bao, F. Y., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef
24.
Zurück zum Zitat Zhao, H. Y., Yang, X., & Li, X. L. (2013). cTrust: Trust management in cyclic mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 62(6), 2792–2806.CrossRef Zhao, H. Y., Yang, X., & Li, X. L. (2013). cTrust: Trust management in cyclic mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 62(6), 2792–2806.CrossRef
Metadaten
Titel
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks
verfasst von
Hui Xia
Jia Yu
Zhen-kuan Pan
Xiang-guo Cheng
Edwin H. -M. Sha
Publikationsdatum
01.10.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2016
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1094-x

Weitere Artikel der Ausgabe 7/2016

Wireless Networks 7/2016 Zur Ausgabe

Neuer Inhalt