Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput.

References

    1. 1)
    2. 2)
    3. 3)
      • Douceur, J.R.: `The Sybil attack', Proc. Int. Workshop on Peer-to-Peer Systems, March 2002, Cambridge, MA, USA, p. 251–260.
    4. 4)
      • A.S. Tanenbaum , A.S. Tanenbaum . (2002) The medium access control sublayer, Computer networks.
    5. 5)
      • Beth, T., Borcherding, M., Klein, B.: `Valuation of trust in open network', Proc. ESORICS, 1994, p. 3–18.
    6. 6)
    7. 7)
      • Refaei, M.T., Srivastava, V., DaSilva, L.: `A reputation-based mechanism for isolating selfish nodes in ', Proc. MobiQuitous, 2005, Washington, DC, p. 3–11.
    8. 8)
    9. 9)
      • Xia, H., Jia, Z.P., Li, X., Zhang, F.: `A subjective trust management model based on AHP for MANET', Proc. Int. Conf. on Network Computing and Information Security (NCIS’11), June 2011, p. 363–368.
    10. 10)
      • Qin, Z.W., Jia, Z.P., Chen, X.H.: `Fuzzy dynamic programming based trusted routing decision in mobile ', Proc. Fifth IEEE Int. Symp. on Embedded Computing (SEC), 7–9 October 2008, p. 180–185.
    11. 11)
      • Jensen, C.D., Connell, P.O.: `Trust-based route selection in dynamic source routing', Proc. Int. Conf. on Trust Management, May 2006, Pisa, Italy, p. 150–163.
    12. 12)
      • 802.11: ‘Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11’, 1997.
    13. 13)
      • J. Martin , L. Manickam , S. Shanmugavel . (2007) Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET’.
    14. 14)
      • George, T.: `Distributed trust evaluation in ', Proc. Third ACM Workshop in Wireless Security, October 2004, p. 1–10.
    15. 15)
      • Hu, Y.C., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ', Proc. Int. Conf. Mobile Computing and Networking (Mobicom’02), September 2002, Atlanta, Georgia, p. 12–23.
    16. 16)
    17. 17)
      • Alkan, M., Erkrmen, A.M., Erkmen, L.: `Fuzzy dynamic programming', Proc. Seventh Mediterranean Electrotechnical Conf., April 1994, 2, p. 732–726.
    18. 18)
      • http://www.isi.edu/nsnam/ns/, accessed September 2009.
    19. 19)
    20. 20)
      • Guo, W., Xiong, Z.W., Li, Z.T.: `Dynamic trust evaluation based routing model for ', Proc. Wireless Communications, Networking and Mobile Computing, September 2005, 2, p. 727–730.
    21. 21)
      • D. Johnson , D. Maltz , I. Tomasz , K. Hank . (1996) Dynamic source routing in , Mobile computing.
    22. 22)
      • Sun, Y.L., Han, Z., Yu, W., Ray, L.K.J.: `Attacks on trust valuation in distributed networks', Proc. 40th Annual Conf. on Information Sciences and Systems, March 2006, p. 1461–1466.
    23. 23)
      • Mui, L.: `Computational models of trust and reputation: agents, evolutionary games, and social networks', 2003, PhD, , Massachusetts.
    24. 24)
      • X. Li , Z. Jia , P. Zhang , R. Zhang , H. Wang . Trust-based on-demand multi path routing in mobile ad hoc networks. IET Special Issue on Multi-Agent Distrib. Inf. Secur. , 4 , 212 - 232
    25. 25)
      • Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: `A simple trust model for on-demand routing in mobile ', Proc. Symp. on Intelligent Distributed Computing (IDC 2008), 2008, p. 105–114.
    26. 26)
      • Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: `Propagation of trust and distrust', Proc. WWW, 2004, p. 403–412.
    27. 27)
      • Miu, L., Mohtashemi, M., Halberstadt, A.: `A computational model of trust and reputation', Proc. 35th Annual Hawaii Int. Conf. on System Sciences, January 2002.
    28. 28)
      • Chang, E.J., Hussain, F.K., Dillon, T.S.: `Fuzzy nature of trust and dynamic trust modeling in service oriented environments', Proc. Workshop on Secure Web Services, November 2005, p. 75–83.
    29. 29)
      • Yu, B., Singh, M.P.: `An evidential model of distributed reputation management', Proc. First Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Part 1, 2002, New York, p. 294–301.
    30. 30)
    31. 31)
    32. 32)
      • Durad, M.H., Cao, Y.D., Zhu, L.H.: `Two novel trust evaluation algorithm', Proc. Communications Circuits and Systems, June 2006, 3, p. 1641–1646.
    33. 33)
      • J.H. Luo , M.Y. Fan . A subjective trust management model based on certainty-factor for MANETs. Chin. J. Comput. Res. Dev. , 3 , 515 - 523
    34. 34)
      • Wen, L.C., Zhang, X.F., Zhu, L.M.: `Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application', Proc. Control and Decision Conf., CCDC’09, 2009, p. 1538–1541.
    35. 35)
      • T.L. Satty . (1980) The analytic hierarchy process.
    36. 36)
      • Sun, Y.L., Yu, W., Han, Z., Ray, L.K.J.: `Trust modeling and evaluation in ', Proc. Global Telecommunications, 2005, p. 1–10.
    37. 37)
      • A.A. Pirzada , C. McDonald , X.Y. Cheng , D.Y. Li . (2006) Reliable routing in , Advances in .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2011.0042
Loading

Related content

content/journals/10.1049/iet-wss.2011.0042
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address