%0 Electronic Article %A H. Xia %A Z. Jia %A L. Ju %A Y. Zhu %K fuzzy dynamic programming theory %K attack resistance %K packet delivery ratio %K malicious node identification %K subjective trust evaluation model %K passage delivery route %K fuzzy trusted dynamic source routing protocol %K trust management model %K network throughput %K fuzzy logic rules prediction method %K standard dynamic source routing protocol %K reactive routing protocol %K MANET %K trusted routing model %K network topology %K mobile ad hoc network %K analytic hierarchy process theory %X Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput. %@ 2043-6386 %T Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory %B IET Wireless Sensor Systems %D December 2011 %V 1 %N 4 %P 248-266 %I Institution of Engineering and Technology %U https://digital-library.theiet.org/;jsessionid=a55ohpkdaes6e.x-iet-live-01content/journals/10.1049/iet-wss.2011.0042 %G EN