Skip to main content
Erschienen in: Wireless Networks 6/2019

20.03.2019

Novel approach of distributed & adaptive trust metrics for MANET

verfasst von: De-gan Zhang, Jin-xin Gao, Xiao-huan Liu, Ting Zhang, De-xin Zhao

Erschienen in: Wireless Networks | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, D. G., Li, G., & Zheng, K. (2014). An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Transactions on Industrial Informatics, 10, 766–773.CrossRef Zhang, D. G., Li, G., & Zheng, K. (2014). An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Transactions on Industrial Informatics, 10, 766–773.CrossRef
2.
Zurück zum Zitat Tan, S. S., Li, X. P., & Dong, Q. K. (2015). Trust based routing mechanism for securing OLSR-Based MANET. Ad Hoc Networks, 30, 84–98.CrossRef Tan, S. S., Li, X. P., & Dong, Q. K. (2015). Trust based routing mechanism for securing OLSR-Based MANET. Ad Hoc Networks, 30, 84–98.CrossRef
3.
Zurück zum Zitat Gungor, V. C., Bin, L., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10), 3557–3564.CrossRef Gungor, V. C., Bin, L., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10), 3557–3564.CrossRef
4.
Zurück zum Zitat Chen, J. Q., & Mao, G. Q. (2018). Capacity of cooperative vehicular networks with infrastructure support: Multi-user case. IEEE Transactions on Vehicular Technology, 67(2), 1546–1560.CrossRef Chen, J. Q., & Mao, G. Q. (2018). Capacity of cooperative vehicular networks with infrastructure support: Multi-user case. IEEE Transactions on Vehicular Technology, 67(2), 1546–1560.CrossRef
5.
Zurück zum Zitat Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5, 131–143.CrossRef Wang, X., Liu, L., & Su, J. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5, 131–143.CrossRef
6.
Zurück zum Zitat Song, X. D., & Wang, X. (2015). Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. International Journal of Electronics and Communications, 69(1), 371–381.CrossRef Song, X. D., & Wang, X. (2015). Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. International Journal of Electronics and Communications, 69(1), 371–381.CrossRef
7.
Zurück zum Zitat Wang, X. (2017). A kind of novel VPF-based energy-balanced routing strategy for wireless mesh network. International Journal of Communication Systems, 30(6), 1–15.CrossRef Wang, X. (2017). A kind of novel VPF-based energy-balanced routing strategy for wireless mesh network. International Journal of Communication Systems, 30(6), 1–15.CrossRef
8.
Zurück zum Zitat Zhang, D. G. (2012). A new approach and system for attentive mobile learning based on seamless migration. Applied Intelligence, 36, 75–89.CrossRef Zhang, D. G. (2012). A new approach and system for attentive mobile learning based on seamless migration. Applied Intelligence, 36, 75–89.CrossRef
9.
Zurück zum Zitat Niu, H. L. (2017). Novel positioning service computing method for WSN. Wireless Personal Communications, 92(4), 1747–1769.CrossRef Niu, H. L. (2017). Novel positioning service computing method for WSN. Wireless Personal Communications, 92(4), 1747–1769.CrossRef
10.
Zurück zum Zitat Zhang, D. G., & Zhu, Y. N. (2012). A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Computers & Mathematics with Applications, 64, 1044–1055.MATHCrossRef Zhang, D. G., & Zhu, Y. N. (2012). A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Computers & Mathematics with Applications, 64, 1044–1055.MATHCrossRef
11.
Zurück zum Zitat Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics, 5, 58–71.CrossRef Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics, 5, 58–71.CrossRef
12.
Zurück zum Zitat Shao, K., & Luo, F. (2012). Normal distribution based dynamical recommendation trust model. Journal of Software, 23(12), 3130–3148.CrossRef Shao, K., & Luo, F. (2012). Normal distribution based dynamical recommendation trust model. Journal of Software, 23(12), 3130–3148.CrossRef
13.
Zurück zum Zitat Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef
14.
Zurück zum Zitat Nordheimer, K., & Schulze, T. (2010). Trustworthiness in networks: A simulation approach for approximating local trust and distrust values. IEEE Communications Surveys and Tutorials, 321, 157–171. Nordheimer, K., & Schulze, T. (2010). Trustworthiness in networks: A simulation approach for approximating local trust and distrust values. IEEE Communications Surveys and Tutorials, 321, 157–171.
15.
Zurück zum Zitat Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 30, 2385–2400.CrossRef Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 30, 2385–2400.CrossRef
16.
Zurück zum Zitat Li, W. B. (2016). Novel ID-based anti-collision approach for RFID. Enterprise Information Systems, 10(7), 771–789.CrossRef Li, W. B. (2016). Novel ID-based anti-collision approach for RFID. Enterprise Information Systems, 10(7), 771–789.CrossRef
17.
Zurück zum Zitat Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16, 969–984.CrossRef
18.
Zurück zum Zitat Li, L., Fan, L., & Hui, H. (2009). Behavior-driven role-based trust management. Journal of Software, 20, 2298–2306.CrossRef Li, L., Fan, L., & Hui, H. (2009). Behavior-driven role-based trust management. Journal of Software, 20, 2298–2306.CrossRef
19.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35, 1001–1012.CrossRef
20.
Zurück zum Zitat Li, N. H., & Mitchell, J. C. (2005). Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52, 474–514.MathSciNetMATHCrossRef Li, N. H., & Mitchell, J. C. (2005). Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52, 474–514.MathSciNetMATHCrossRef
21.
Zurück zum Zitat Wang, X., & Song, X. D. (2015). New medical image fusion approach with coding based on SCD in wireless sensor network. Journal of Electrical Engineering & Technology, 10(6), 2384–2392.CrossRef Wang, X., & Song, X. D. (2015). New medical image fusion approach with coding based on SCD in wireless sensor network. Journal of Electrical Engineering & Technology, 10(6), 2384–2392.CrossRef
22.
Zurück zum Zitat Niu, H. L. (2017). Novel PEECR-based clustering routing approach. Soft Computing, 21(24), 7313–7323.CrossRef Niu, H. L. (2017). Novel PEECR-based clustering routing approach. Soft Computing, 21(24), 7313–7323.CrossRef
23.
Zurück zum Zitat Feng, R. J., Xu, X. F., & Zhou, X. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors, 11, 1345–1360.CrossRef Feng, R. J., Xu, X. F., & Zhou, X. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors, 11, 1345–1360.CrossRef
24.
Zurück zum Zitat Jiang, J. F., Han, G. J., & Wang, F. (2015). An efficient distrubuted trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26, 1228–1237.CrossRef Jiang, J. F., Han, G. J., & Wang, F. (2015). An efficient distrubuted trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26, 1228–1237.CrossRef
25.
Zurück zum Zitat Zhou, S., & Chen, J. (2017). New Dv-distance method based on path for wireless sensor network. Intelligent Automation and Soft Computing, 23(2), 219–225.CrossRef Zhou, S., & Chen, J. (2017). New Dv-distance method based on path for wireless sensor network. Intelligent Automation and Soft Computing, 23(2), 219–225.CrossRef
26.
Zurück zum Zitat Zhang, T. (2018). Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning. Journal of Network and Computer Applications, 2018(122), 37–49.CrossRef Zhang, T. (2018). Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning. Journal of Network and Computer Applications, 2018(122), 37–49.CrossRef
27.
Zurück zum Zitat Li, G., & Pan, Z. H. (2014). A new anti-collision algorithm for RFID tag. International Journal of Communication Systems, 27(11), 3312–3322. Li, G., & Pan, Z. H. (2014). A new anti-collision algorithm for RFID tag. International Journal of Communication Systems, 27(11), 3312–3322.
28.
Zurück zum Zitat Chatterjee, P., & Sengupta, I. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20, 1669–1684.CrossRef Chatterjee, P., & Sengupta, I. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20, 1669–1684.CrossRef
29.
Zurück zum Zitat Wang, G., & Gui, X. L. (2013). The selection of trading node and the calculation method of trust relationship in social network. Chinese Journal of Computers, 36, 368–383. (in Chinese with English abstract).CrossRef Wang, G., & Gui, X. L. (2013). The selection of trading node and the calculation method of trust relationship in social network. Chinese Journal of Computers, 36, 368–383. (in Chinese with English abstract).CrossRef
30.
Zurück zum Zitat Zhu, Y. N., Liu, S., & Zhang, X. D. (2016). Multi-radio multi-channel (MRMC) resource optimization method for wireless mesh network. Journal of Information Science and Engineering, 32(2), 501–519.MathSciNet Zhu, Y. N., Liu, S., & Zhang, X. D. (2016). Multi-radio multi-channel (MRMC) resource optimization method for wireless mesh network. Journal of Information Science and Engineering, 32(2), 501–519.MathSciNet
31.
Zurück zum Zitat Li, X. Y., & Gui, X. L. (2010). The cognitive model of dynamic trust. Journal of Software, 21, 163–176. (in Chinese with English abstract).CrossRef Li, X. Y., & Gui, X. L. (2010). The cognitive model of dynamic trust. Journal of Software, 21, 163–176. (in Chinese with English abstract).CrossRef
32.
Zurück zum Zitat Yuan, W. W., Guan, D. H., & Lee, Y. K. (2010). The small-world trust network. Appliede Intelligence, 35, 399–410.CrossRef Yuan, W. W., Guan, D. H., & Lee, Y. K. (2010). The small-world trust network. Appliede Intelligence, 35, 399–410.CrossRef
34.
Zurück zum Zitat Ma, Z. (2016). A novel compressive sensing method based on SVD sparse random measurement matrix in wireless sensor network. Engineering Computations, 33(8), 2448–2462.CrossRef Ma, Z. (2016). A novel compressive sensing method based on SVD sparse random measurement matrix in wireless sensor network. Engineering Computations, 33(8), 2448–2462.CrossRef
35.
Zurück zum Zitat Zhang, X. D. (2012). Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application. Enterprise Information Systems, 6(4), 473–489.CrossRef Zhang, X. D. (2012). Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application. Enterprise Information Systems, 6(4), 473–489.CrossRef
37.
Zurück zum Zitat Zhao, C. P. (2012). A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. Computers & Electrical Engineering, 38(3), 694–702.CrossRef Zhao, C. P. (2012). A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network. Computers & Electrical Engineering, 38(3), 694–702.CrossRef
38.
Zurück zum Zitat Liang, Y. P. (2013). A kind of novel method of service-aware computing for uncertain mobile applications. Mathematical and Computer Modelling, 57(3–4), 344–356. Liang, Y. P. (2013). A kind of novel method of service-aware computing for uncertain mobile applications. Mathematical and Computer Modelling, 57(3–4), 344–356.
39.
Zurück zum Zitat Ma, Z. (2017). Shadow detection of moving objects based on multisource information in internet of things. Journal of Experimental & Theoretical Artificial Intelligence, 29(3), 649–661.MathSciNetCrossRef Ma, Z. (2017). Shadow detection of moving objects based on multisource information in internet of things. Journal of Experimental & Theoretical Artificial Intelligence, 29(3), 649–661.MathSciNetCrossRef
41.
Zurück zum Zitat Zhang, D. G. (2014). A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Transactions on Services Computing, 7(4), 741–748.CrossRef Zhang, D. G. (2014). A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Transactions on Services Computing, 7(4), 741–748.CrossRef
43.
Zurück zum Zitat Song, X. D. (2015). New agent-based proactive migration method and system for big data environment (BDE). Engineering Computations, 32(8), 2443–2466.CrossRef Song, X. D. (2015). New agent-based proactive migration method and system for big data environment (BDE). Engineering Computations, 32(8), 2443–2466.CrossRef
46.
Zurück zum Zitat Zheng, K. (2016). Novel quick start (QS) method for optimization of TCP. Wireless Networks, 22(1), 211–222.CrossRef Zheng, K. (2016). Novel quick start (QS) method for optimization of TCP. Wireless Networks, 22(1), 211–222.CrossRef
47.
Zurück zum Zitat Zheng, K. (2015). A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Computing, 19(7), 1817–1827.CrossRef Zheng, K. (2015). A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Computing, 19(7), 1817–1827.CrossRef
51.
Zurück zum Zitat Zhao, D. X., Ma, Z., & Zhang, D. G. (2016). A distributed and adaptive trust evaluation algorithm for MANET. ACM MSWiM/Q2SWinet’16, 11, 47–54. Zhao, D. X., Ma, Z., & Zhang, D. G. (2016). A distributed and adaptive trust evaluation algorithm for MANET. ACM MSWiM/Q2SWinet’16, 11, 47–54.
Metadaten
Titel
Novel approach of distributed & adaptive trust metrics for MANET
verfasst von
De-gan Zhang
Jin-xin Gao
Xiao-huan Liu
Ting Zhang
De-xin Zhao
Publikationsdatum
20.03.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01955-2

Weitere Artikel der Ausgabe 6/2019

Wireless Networks 6/2019 Zur Ausgabe

Neuer Inhalt