© The Institution of Engineering and Technology
Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput.
References
-
-
1)
-
A.A. Pirzada ,
C. McDonald ,
A. Datta
.
Performance comparison of trust-based reactive routing protocols.
IEEE Trans. Mobile Comput.
,
6 ,
695 -
710
-
2)
-
M.G. Zapata ,
N. Asokan
.
Secure ad hoc on-demand distance vector routing.
ACM Mobile Comput. Commun. Rev.
,
6 ,
106 -
107
-
3)
-
Douceur, J.R.: `The Sybil attack', Proc. Int. Workshop on Peer-to-Peer Systems, March 2002, Cambridge, MA, USA, p. 251–260.
-
4)
-
A.S. Tanenbaum ,
A.S. Tanenbaum
.
(2002)
The medium access control sublayer, Computer networks.
-
5)
-
Beth, T., Borcherding, M., Klein, B.: `Valuation of trust in open network', Proc. ESORICS, 1994, p. 3–18.
-
6)
-
Y.L. Sun ,
W. Yu ,
Z. Han ,
L.K.J. Ray
.
Information theoretic framework of trust modeling and evaluation for ad hoc networks.
IEEE J. Sel. Areas Commun.
,
2 ,
305 -
319
-
7)
-
Refaei, M.T., Srivastava, V., DaSilva, L.: `A reputation-based mechanism for isolating selfish nodes in ', Proc. MobiQuitous, 2005, Washington, DC, p. 3–11.
-
8)
-
A.A. Pirzada ,
C. McDonald
.
Trust establishment in pure ad hoc networks.
Wirel. Pers. Commun.
,
1 ,
39 -
168
-
9)
-
Xia, H., Jia, Z.P., Li, X., Zhang, F.: `A subjective trust management model based on AHP for MANET', Proc. Int. Conf. on Network Computing and Information Security (NCIS’11), June 2011, p. 363–368.
-
10)
-
Qin, Z.W., Jia, Z.P., Chen, X.H.: `Fuzzy dynamic programming based trusted routing decision in mobile ', Proc. Fifth IEEE Int. Symp. on Embedded Computing (SEC), 7–9 October 2008, p. 180–185.
-
11)
-
Jensen, C.D., Connell, P.O.: `Trust-based route selection in dynamic source routing', Proc. Int. Conf. on Trust Management, May 2006, Pisa, Italy, p. 150–163.
-
12)
-
802.11: ‘Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11’, 1997.
-
13)
-
J. Martin ,
L. Manickam ,
S. Shanmugavel
.
(2007)
Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET’.
-
14)
-
George, T.: `Distributed trust evaluation in ', Proc. Third ACM Workshop in Wireless Security, October 2004, p. 1–10.
-
15)
-
Hu, Y.C., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ', Proc. Int. Conf. Mobile Computing and Networking (Mobicom’02), September 2002, Atlanta, Georgia, p. 12–23.
-
16)
-
R.E. Bellman ,
L.A. Zadeh
.
Decision-making in a fuzzy environment.
Manage. Sci.
,
pp. B141 -
B164
-
17)
-
Alkan, M., Erkrmen, A.M., Erkmen, L.: `Fuzzy dynamic programming', Proc. Seventh Mediterranean Electrotechnical Conf., April 1994, 2, p. 732–726.
-
18)
-
http://www.isi.edu/nsnam/ns/, accessed September 2009.
-
19)
-
C. Bettstetter ,
G. Resta ,
P. Santi
.
The node distribution of the random waypoint mobility model for wireless ad hoc networks.
IEEE Trans. Mobile Comput.
,
3 ,
257 -
269
-
20)
-
Guo, W., Xiong, Z.W., Li, Z.T.: `Dynamic trust evaluation based routing model for ', Proc. Wireless Communications, Networking and Mobile Computing, September 2005, 2, p. 727–730.
-
21)
-
D. Johnson ,
D. Maltz ,
I. Tomasz ,
K. Hank
.
(1996)
Dynamic source routing in , Mobile computing.
-
22)
-
Sun, Y.L., Han, Z., Yu, W., Ray, L.K.J.: `Attacks on trust valuation in distributed networks', Proc. 40th Annual Conf. on Information Sciences and Systems, March 2006, p. 1461–1466.
-
23)
-
Mui, L.: `Computational models of trust and reputation: agents, evolutionary games, and social networks', 2003, PhD, , Massachusetts.
-
24)
-
X. Li ,
Z. Jia ,
P. Zhang ,
R. Zhang ,
H. Wang
.
Trust-based on-demand multi path routing in mobile ad hoc networks.
IET Special Issue on Multi-Agent Distrib. Inf. Secur.
,
4 ,
212 -
232
-
25)
-
Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: `A simple trust model for on-demand routing in mobile ', Proc. Symp. on Intelligent Distributed Computing (IDC 2008), 2008, p. 105–114.
-
26)
-
Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: `Propagation of trust and distrust', Proc. WWW, 2004, p. 403–412.
-
27)
-
Miu, L., Mohtashemi, M., Halberstadt, A.: `A computational model of trust and reputation', Proc. 35th Annual Hawaii Int. Conf. on System Sciences, January 2002.
-
28)
-
Chang, E.J., Hussain, F.K., Dillon, T.S.: `Fuzzy nature of trust and dynamic trust modeling in service oriented environments', Proc. Workshop on Secure Web Services, November 2005, p. 75–83.
-
29)
-
Yu, B., Singh, M.P.: `An evidential model of distributed reputation management', Proc. First Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Part 1, 2002, New York, p. 294–301.
-
30)
-
A. Josang
.
A logic for uncertain probabilities.
Int. J. Uncertainty, Fuzziness, Knowledge-Based Syst.
,
3 ,
279 -
311
-
31)
-
R.E. Khayata ,
C.M. Puig ,
J.M. Zweig
.
A distributed medium access protocol for wireless LANs.
Signals Syst. Comput.
,
238 -
242
-
32)
-
Durad, M.H., Cao, Y.D., Zhu, L.H.: `Two novel trust evaluation algorithm', Proc. Communications Circuits and Systems, June 2006, 3, p. 1641–1646.
-
33)
-
J.H. Luo ,
M.Y. Fan
.
A subjective trust management model based on certainty-factor for MANETs.
Chin. J. Comput. Res. Dev.
,
3 ,
515 -
523
-
34)
-
Wen, L.C., Zhang, X.F., Zhu, L.M.: `Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application', Proc. Control and Decision Conf., CCDC’09, 2009, p. 1538–1541.
-
35)
-
T.L. Satty
.
(1980)
The analytic hierarchy process.
-
36)
-
Sun, Y.L., Yu, W., Han, Z., Ray, L.K.J.: `Trust modeling and evaluation in ', Proc. Global Telecommunications, 2005, p. 1–10.
-
37)
-
A.A. Pirzada ,
C. McDonald ,
X.Y. Cheng ,
D.Y. Li
.
(2006)
Reliable routing in , Advances in .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2011.0042
Related content
content/journals/10.1049/iet-wss.2011.0042
pub_keyword,iet_inspecKeyword,pub_concept
6
6