Skip to main content
Top
Published in: Wireless Networks 6/2019

20-03-2019

Novel approach of distributed & adaptive trust metrics for MANET

Authors: De-gan Zhang, Jin-xin Gao, Xiao-huan Liu, Ting Zhang, De-xin Zhao

Published in: Wireless Networks | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhang, D. G., Li, G., & Zheng, K. (2014). An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Transactions on Industrial Informatics, 10, 766–773.CrossRef Zhang, D. G., Li, G., & Zheng, K. (2014). An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Transactions on Industrial Informatics, 10, 766–773.CrossRef
2.
go back to reference Tan, S. S., Li, X. P., & Dong, Q. K. (2015). Trust based routing mechanism for securing OLSR-Based MANET. Ad Hoc Networks, 30, 84–98.CrossRef Tan, S. S., Li, X. P., & Dong, Q. K. (2015). Trust based routing mechanism for securing OLSR-Based MANET. Ad Hoc Networks, 30, 84–98.CrossRef
3.
go back to reference Gungor, V. C., Bin, L., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10), 3557–3564.CrossRef Gungor, V. C., Bin, L., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10), 3557–3564.CrossRef
4.
go back to reference Chen, J. Q., & Mao, G. Q. (2018). Capacity of cooperative vehicular networks with infrastructure support: Multi-user case. IEEE Transactions on Vehicular Technology, 67(2), 1546–1560.CrossRef Chen, J. Q., & Mao, G. Q. (2018). Capacity of cooperative vehicular networks with infrastructure support: Multi-user case. IEEE Transactions on Vehicular Technology, 67(2), 1546–1560.CrossRef
5.
go back to reference Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5, 131–143.CrossRef Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5, 131–143.CrossRef
6.
go back to reference Song, X. D., & Wang, X. (2015). Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. International Journal of Electronics and Communications, 69(1), 371–381.CrossRef Song, X. D., & Wang, X. (2015). Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. International Journal of Electronics and Communications, 69(1), 371–381.CrossRef
7.
go back to reference Wang, X. (2017). A kind of novel VPF-based energy-balanced routing strategy for wireless mesh network. International Journal of Communication Systems, 30(6), 1–15.CrossRef Wang, X. (2017). A kind of novel VPF-based energy-balanced routing strategy for wireless mesh network. International Journal of Communication Systems, 30(6), 1–15.CrossRef
8.
go back to reference Zhang, D. G. (2012). A new approach and system for attentive mobile learning based on seamless migration. Applied Intelligence, 36, 75–89.CrossRef Zhang, D. G. (2012). A new approach and system for attentive mobile learning based on seamless migration. Applied Intelligence, 36, 75–89.CrossRef
9.
go back to reference Niu, H. L. (2017). Novel positioning service computing method for WSN. Wireless Personal Communications, 92(4), 1747–1769.CrossRef Niu, H. L. (2017). Novel positioning service computing method for WSN. Wireless Personal Communications, 92(4), 1747–1769.CrossRef
10.
go back to reference Zhang, D. G., & Zhu, Y. N. (2012). A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Computers & Mathematics with Applications, 64, 1044–1055.MATHCrossRef Zhang, D. G., & Zhu, Y. N. (2012). A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Computers & Mathematics with Applications, 64, 1044–1055.MATHCrossRef
11.
go back to reference Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics, 5, 58–71.CrossRef Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics, 5, 58–71.CrossRef
12.
go back to reference Shao, K., & Luo, F. (2012). Normal distribution based dynamical recommendation trust model. Journal of Software, 23(12), 3130–3148.CrossRef Shao, K., & Luo, F. (2012). Normal distribution based dynamical recommendation trust model. Journal of Software, 23(12), 3130–3148.CrossRef
13.
go back to reference Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef
14.
go back to reference Nordheimer, K., & Schulze, T. (2010). Trustworthiness in networks: A simulation approach for approximating local trust and distrust values. IEEE Communications Surveys and Tutorials, 321, 157–171. Nordheimer, K., & Schulze, T. (2010). Trustworthiness in networks: A simulation approach for approximating local trust and distrust values. IEEE Communications Surveys and Tutorials, 321, 157–171.
15.
go back to reference Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 30, 2385–2400.CrossRef Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 30, 2385–2400.CrossRef
16.
go back to reference Li, W. B. (2016). Novel ID-based anti-collision approach for RFID. Enterprise Information Systems, 10(7), 771–789.CrossRef Li, W. B. (2016). Novel ID-based anti-collision approach for RFID. Enterprise Information Systems, 10(7), 771–789.CrossRef
17.
go back to reference Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef
18.
go back to reference Li, L., Fan, L., & Hui, H. (2009). Behavior-driven role-based trust management. Journal of Software, 20, 2298–2306.CrossRef Li, L., Fan, L., & Hui, H. (2009). Behavior-driven role-based trust management. Journal of Software, 20, 2298–2306.CrossRef
19.
go back to reference Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef
20.
go back to reference Li, N. H., & Mitchell, J. C. (2005). Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52, 474–514.MathSciNetMATHCrossRef Li, N. H., & Mitchell, J. C. (2005). Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52, 474–514.MathSciNetMATHCrossRef
21.
go back to reference Wang, X., & Song, X. D. (2015). New medical image fusion approach with coding based on SCD in wireless sensor network. Journal of Electrical Engineering & Technology, 10(6), 2384–2392.CrossRef Wang, X., & Song, X. D. (2015). New medical image fusion approach with coding based on SCD in wireless sensor network. Journal of Electrical Engineering & Technology, 10(6), 2384–2392.CrossRef
22.
go back to reference Niu, H. L. (2017). Novel PEECR-based clustering routing approach. Soft Computing, 21(24), 7313–7323.CrossRef Niu, H. L. (2017). Novel PEECR-based clustering routing approach. Soft Computing, 21(24), 7313–7323.CrossRef
23.
go back to reference Feng, R. J., Xu, X. F., & Zhou, X. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors, 11, 1345–1360.CrossRef Feng, R. J., Xu, X. F., & Zhou, X. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors, 11, 1345–1360.CrossRef
24.
go back to reference Jiang, J. F., Han, G. J., & Wang, F. (2015). An efficient distrubuted trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26, 1228–1237.CrossRef Jiang, J. F., Han, G. J., & Wang, F. (2015). An efficient distrubuted trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26, 1228–1237.CrossRef
25.
go back to reference Zhou, S., & Chen, J. (2017). New Dv-distance method based on path for wireless sensor network. Intelligent Automation and Soft Computing, 23(2), 219–225.CrossRef Zhou, S., & Chen, J. (2017). New Dv-distance method based on path for wireless sensor network. Intelligent Automation and Soft Computing, 23(2), 219–225.CrossRef
26.
go back to reference Zhang, T. (2018). Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning. Journal of Network and Computer Applications, 2018(122), 37–49.CrossRef Zhang, T. (2018). Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning. Journal of Network and Computer Applications, 2018(122), 37–49.CrossRef
27.
go back to reference Li, G., & Pan, Z. H. (2014). A new anti-collision algorithm for RFID tag. International Journal of Communication Systems, 27(11), 3312–3322. Li, G., & Pan, Z. H. (2014). A new anti-collision algorithm for RFID tag. International Journal of Communication Systems, 27(11), 3312–3322.
28.
go back to reference Chatterjee, P., & Sengupta, I. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20, 1669–1684.CrossRef Chatterjee, P., & Sengupta, I. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20, 1669–1684.CrossRef
29.
go back to reference Wang, G., & Gui, X. L. (2013). The selection of trading node and the calculation method of trust relationship in social network. Chinese Journal of Computers, 36, 368–383. (in Chinese with English abstract).CrossRef Wang, G., & Gui, X. L. (2013). The selection of trading node and the calculation method of trust relationship in social network. Chinese Journal of Computers, 36, 368–383. (in Chinese with English abstract).CrossRef
30.
go back to reference Zhu, Y. N., Liu, S., & Zhang, X. D. (2016). Multi-radio multi-channel (MRMC) resource optimization method for wireless mesh network. Journal of Information Science and Engineering, 32(2), 501–519.MathSciNet Zhu, Y. N., Liu, S., & Zhang, X. D. (2016). Multi-radio multi-channel (MRMC) resource optimization method for wireless mesh network. Journal of Information Science and Engineering, 32(2), 501–519.MathSciNet
31.
go back to reference Li, X. Y., & Gui, X. L. (2010). The cognitive model of dynamic trust. Journal of Software, 21, 163–176. (in Chinese with English abstract).CrossRef Li, X. Y., & Gui, X. L. (2010). The cognitive model of dynamic trust. Journal of Software, 21, 163–176. (in Chinese with English abstract).CrossRef
32.
go back to reference Yuan, W. W., Guan, D. H., & Lee, Y. K. (2010). The small-world trust network. Appliede Intelligence, 35, 399–410.CrossRef Yuan, W. W., Guan, D. H., & Lee, Y. K. (2010). The small-world trust network. Appliede Intelligence, 35, 399–410.CrossRef
34.
go back to reference Ma, Z. (2016). A novel compressive sensing method based on SVD sparse random measurement matrix in wireless sensor network. Engineering Computations, 33(8), 2448–2462.CrossRef Ma, Z. (2016). A novel compressive sensing method based on SVD sparse random measurement matrix in wireless sensor network. Engineering Computations, 33(8), 2448–2462.CrossRef
35.
go back to reference Zhang, X. D. (2012). Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application. Enterprise Information Systems, 6(4), 473–489.CrossRef Zhang, X. D. (2012). Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application. Enterprise Information Systems, 6(4), 473–489.CrossRef
37.
go back to reference Zhao, C. P. (2012). A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. Computers & Electrical Engineering, 38(3), 694–702.CrossRef Zhao, C. P. (2012). A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. Computers & Electrical Engineering, 38(3), 694–702.CrossRef
38.
go back to reference Liang, Y. P. (2013). A kind of novel method of service-aware computing for uncertain mobile applications. Mathematical and Computer Modelling, 57(3–4), 344–356. Liang, Y. P. (2013). A kind of novel method of service-aware computing for uncertain mobile applications. Mathematical and Computer Modelling, 57(3–4), 344–356.
39.
go back to reference Ma, Z. (2017). Shadow detection of moving objects based on multisource information in internet of things. Journal of Experimental & Theoretical Artificial Intelligence, 29(3), 649–661.MathSciNetCrossRef Ma, Z. (2017). Shadow detection of moving objects based on multisource information in internet of things. Journal of Experimental & Theoretical Artificial Intelligence, 29(3), 649–661.MathSciNetCrossRef
41.
go back to reference Zhang, D. G. (2014). A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Transactions on Services Computing, 7(4), 741–748.CrossRef Zhang, D. G. (2014). A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Transactions on Services Computing, 7(4), 741–748.CrossRef
43.
go back to reference Song, X. D. (2015). New agent-based proactive migration method and system for big data environment (BDE). Engineering Computations, 32(8), 2443–2466.CrossRef Song, X. D. (2015). New agent-based proactive migration method and system for big data environment (BDE). Engineering Computations, 32(8), 2443–2466.CrossRef
46.
go back to reference Zheng, K. (2016). Novel quick start (QS) method for optimization of TCP. Wireless Networks, 22(1), 211–222.CrossRef Zheng, K. (2016). Novel quick start (QS) method for optimization of TCP. Wireless Networks, 22(1), 211–222.CrossRef
47.
go back to reference Zheng, K. (2015). A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Computing, 19(7), 1817–1827.CrossRef Zheng, K. (2015). A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Computing, 19(7), 1817–1827.CrossRef
51.
go back to reference Zhao, D. X., Ma, Z., & Zhang, D. G. (2016). A distributed and adaptive trust evaluation algorithm for MANET. ACM MSWiM/Q2SWinet’16, 11, 47–54. Zhao, D. X., Ma, Z., & Zhang, D. G. (2016). A distributed and adaptive trust evaluation algorithm for MANET. ACM MSWiM/Q2SWinet’16, 11, 47–54.
Metadata
Title
Novel approach of distributed & adaptive trust metrics for MANET
Authors
De-gan Zhang
Jin-xin Gao
Xiao-huan Liu
Ting Zhang
De-xin Zhao
Publication date
20-03-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01955-2

Other articles of this Issue 6/2019

Wireless Networks 6/2019 Go to the issue