Skip to main content
Top
Published in: Wireless Networks 5/2013

01-07-2013

Resources-aware trusted node selection for content distribution in mobile ad hoc networks

Authors: Mentari Djatmiko, Roksana Boreli, Aruna Seneviratne, Sebastian Ries

Published in: Wireless Networks | Issue 5/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We propose a novel trust and probabilistic node selection mechanism for content distribution in mobile ad hoc networks. Due to the open nature of such networks which as a rule do not have strict node membership control, the selection of trustworthy nodes is an important challenge, especially as the resources (e.g., battery, bandwidth) of the mobile devices are limited and should not be wasted on erroneous or malicious content. Our proposal, in addition to considering the trustworthiness of nodes, ensures that the traffic load is equally shared amongst the population of nodes, thus further conserving mobile node resources. We analyse the proposed mechanisms and evaluate it against selected previously proposed trust schemes which, in the majority, favour the selection of the most trustworthy node. We demonstrate the benefits of our proposal which provides load balancing and prevents overuse of a single node’s resources, while still providing a good performance in regards to accurately choosing trustworthy nodes to provide the required content.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For good nodes the probability for a good outcome equals to the probability of adhering to the core integrity behaviour P(A), for bad nodes it is 1 − P(A).
 
Literature
1.
go back to reference Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2006). TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12, 183–198.CrossRef Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2006). TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12, 183–198.CrossRef
2.
go back to reference Ries, S., & Heinemann, A. (2008). Analyzing the robustness of certain trust. In Y. Karabulut, J. Mitchell, P. Herrmann & C. Jensen (Eds.), Trust management II, IFIP advances in information and communication technology (pp. 51–67). Boston: Springer. Ries, S., & Heinemann, A. (2008). Analyzing the robustness of certain trust. In Y. Karabulut, J. Mitchell, P. Herrmann & C. Jensen (Eds.), Trust management II, IFIP advances in information and communication technology (pp. 51–67). Boston: Springer.
3.
go back to reference Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: Advanced communications and multimedia security, p. 121. Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: Advanced communications and multimedia security, p. 121.
5.
go back to reference Shankaran, R., Varadharajan, V., Orgun, M. A., & Hitchens, M. (2009). Context-aware trust management for peer-to-peer mobile ad-hoc networks. Computer Software and Applications Conference, 2, 188–193. Shankaran, R., Varadharajan, V., Orgun, M. A., & Hitchens, M. (2009). Context-aware trust management for peer-to-peer mobile ad-hoc networks. Computer Software and Applications Conference, 2, 188–193.
7.
go back to reference Djatmiko, M., Boreli, R., Seneviratne, A., & Ries, S. (2011). Trust-based content distribution for mobile ad hoc networks, modeling, analysis simulation of computer and telecommunication systems (MASCOTS). 2011 IEEE 19th international symposium on, pp. 433–436. Djatmiko, M., Boreli, R., Seneviratne, A., & Ries, S. (2011). Trust-based content distribution for mobile ad hoc networks, modeling, analysis simulation of computer and telecommunication systems (MASCOTS). 2011 IEEE 19th international symposium on, pp. 433–436.
9.
go back to reference Petander, H. (2009). Energy-aware network selection using traffic estimation. In Proceedings of the 1st ACM workshop on mobile internet through cellular networks, MICNET ’09, pp. 55–60. Petander, H. (2009). Energy-aware network selection using traffic estimation. In Proceedings of the 1st ACM workshop on mobile internet through cellular networks, MICNET ’09, pp. 55–60.
10.
go back to reference Li, X., Zhou, F., & Yang, X. (2011). A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 2, 188–193. Li, X., Zhou, F., & Yang, X. (2011). A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 2, 188–193.
11.
go back to reference Quercia, D., & Hailes, S. (2007). MATE: Mobility and adaptation with trust and expected-utility. International Journal of Internet Technology and Secured Transactions (IJITST), 1, 43–53. Quercia, D., & Hailes, S. (2007). MATE: Mobility and adaptation with trust and expected-utility. International Journal of Internet Technology and Secured Transactions (IJITST), 1, 43–53.
12.
go back to reference Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th international conference on World Wide Web, pp. 640–651. Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th international conference on World Wide Web, pp. 640–651.
14.
go back to reference Lee, J. H., Han, B. J., Lim, H. J., Kim, Y. D., Saxena, N., & Chung, T. M. (2009). Optimizing access point allocation using genetic algorithmic approach for smart home environments. The Computer Journal, 52(8), 938–949.CrossRef Lee, J. H., Han, B. J., Lim, H. J., Kim, Y. D., Saxena, N., & Chung, T. M. (2009). Optimizing access point allocation using genetic algorithmic approach for smart home environments. The Computer Journal, 52(8), 938–949.CrossRef
15.
go back to reference Bai, F., Sadagopan, N., & Helmy, A. (2003). IMPORTANT: a framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. INFOCOM, 2, 825–835. Bai, F., Sadagopan, N., & Helmy, A. (2003). IMPORTANT: a framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. INFOCOM, 2, 825–835.
16.
go back to reference Lee, K., Hong, S., Kim, S. J., Rhee, I., & Chong, S. (2009). SLAW: A new mobility model for human walks. INFOCOM , 855–863. Lee, K., Hong, S., Kim, S. J., Rhee, I., & Chong, S. (2009). SLAW: A new mobility model for human walks. INFOCOM , 855–863.
17.
go back to reference Tournoux, P. -U., Leguay, J., Benbadis, F., Conan, V., de Amorim, M. D., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN routing. INFOCOM , pp. 1116–1124. Tournoux, P. -U., Leguay, J., Benbadis, F., Conan, V., de Amorim, M. D., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN routing. INFOCOM , pp. 1116–1124.
18.
go back to reference Whitbeck, J., de Amorim, M. D., & Conan, V. (2010). Plausible mobility: Inferring movement from contacts. In Proceedings of the second international workshop on mobile opportunistic networking (MobiOpp ’10), pp 110–117. Whitbeck, J., de Amorim, M. D., & Conan, V. (2010). Plausible mobility: Inferring movement from contacts. In Proceedings of the second international workshop on mobile opportunistic networking (MobiOpp ’10), pp 110–117.
19.
go back to reference Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153–181.CrossRef Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153–181.CrossRef
Metadata
Title
Resources-aware trusted node selection for content distribution in mobile ad hoc networks
Authors
Mentari Djatmiko
Roksana Boreli
Aruna Seneviratne
Sebastian Ries
Publication date
01-07-2013
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2013
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-012-0505-5

Other articles of this Issue 5/2013

Wireless Networks 5/2013 Go to the issue