http://iet.metastore.ingenta.com
1887

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput.

References

    1. 1)
      • Sun, Y.L., Han, Z., Yu, W., Ray, L.K.J.: `Attacks on trust valuation in distributed networks', Proc. 40th Annual Conf. on Information Sciences and Systems, March 2006, p. 1461–1466.
    2. 2)
    3. 3)
      • Miu, L., Mohtashemi, M., Halberstadt, A.: `A computational model of trust and reputation', Proc. 35th Annual Hawaii Int. Conf. on System Sciences, January 2002.
    4. 4)
    5. 5)
      • Hu, Y.C., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ', Proc. Int. Conf. Mobile Computing and Networking (Mobicom’02), September 2002, Atlanta, Georgia, p. 12–23.
    6. 6)
      • Refaei, M.T., Srivastava, V., DaSilva, L.: `A reputation-based mechanism for isolating selfish nodes in ', Proc. MobiQuitous, 2005, Washington, DC, p. 3–11.
    7. 7)
      • D. Johnson , D. Maltz , I. Tomasz , K. Hank . (1996) Dynamic source routing in , Mobile computing.
    8. 8)
      • Jensen, C.D., Connell, P.O.: `Trust-based route selection in dynamic source routing', Proc. Int. Conf. on Trust Management, May 2006, Pisa, Italy, p. 150–163.
    9. 9)
      • Chang, E.J., Hussain, F.K., Dillon, T.S.: `Fuzzy nature of trust and dynamic trust modeling in service oriented environments', Proc. Workshop on Secure Web Services, November 2005, p. 75–83.
    10. 10)
      • Yu, B., Singh, M.P.: `An evidential model of distributed reputation management', Proc. First Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Part 1, 2002, New York, p. 294–301.
    11. 11)
      • Beth, T., Borcherding, M., Klein, B.: `Valuation of trust in open network', Proc. ESORICS, 1994, p. 3–18.
    12. 12)
    13. 13)
      • Mui, L.: `Computational models of trust and reputation: agents, evolutionary games, and social networks', 2003, PhD, , Massachusetts.
    14. 14)
      • Durad, M.H., Cao, Y.D., Zhu, L.H.: `Two novel trust evaluation algorithm', Proc. Communications Circuits and Systems, June 2006, 3, p. 1641–1646.
    15. 15)
      • George, T.: `Distributed trust evaluation in ', Proc. Third ACM Workshop in Wireless Security, October 2004, p. 1–10.
    16. 16)
    17. 17)
      • Sun, Y.L., Yu, W., Han, Z., Ray, L.K.J.: `Trust modeling and evaluation in ', Proc. Global Telecommunications, 2005, p. 1–10.
    18. 18)
      • J.H. Luo , M.Y. Fan . A subjective trust management model based on certainty-factor for MANETs. Chin. J. Comput. Res. Dev. , 3 , 515 - 523
    19. 19)
      • Wen, L.C., Zhang, X.F., Zhu, L.M.: `Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application', Proc. Control and Decision Conf., CCDC’09, 2009, p. 1538–1541.
    20. 20)
    21. 21)
      • Guo, W., Xiong, Z.W., Li, Z.T.: `Dynamic trust evaluation based routing model for ', Proc. Wireless Communications, Networking and Mobile Computing, September 2005, 2, p. 727–730.
    22. 22)
      • J. Martin , L. Manickam , S. Shanmugavel . (2007) Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET’.
    23. 23)
      • Xia, H., Jia, Z.P., Li, X., Zhang, F.: `A subjective trust management model based on AHP for MANET', Proc. Int. Conf. on Network Computing and Information Security (NCIS’11), June 2011, p. 363–368.
    24. 24)
      • T.L. Satty . (1980) The analytic hierarchy process.
    25. 25)
      • Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: `Propagation of trust and distrust', Proc. WWW, 2004, p. 403–412.
    26. 26)
      • Alkan, M., Erkrmen, A.M., Erkmen, L.: `Fuzzy dynamic programming', Proc. Seventh Mediterranean Electrotechnical Conf., April 1994, 2, p. 732–726.
    27. 27)
    28. 28)
      • Qin, Z.W., Jia, Z.P., Chen, X.H.: `Fuzzy dynamic programming based trusted routing decision in mobile ', Proc. Fifth IEEE Int. Symp. on Embedded Computing (SEC), 7–9 October 2008, p. 180–185.
    29. 29)
    30. 30)
      • http://www.isi.edu/nsnam/ns/, accessed September 2009.
    31. 31)
      • 802.11: ‘Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11’, 1997.
    32. 32)
      • A.S. Tanenbaum , A.S. Tanenbaum . (2002) The medium access control sublayer, Computer networks.
    33. 33)
    34. 34)
      • Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: `A simple trust model for on-demand routing in mobile ', Proc. Symp. on Intelligent Distributed Computing (IDC 2008), 2008, p. 105–114.
    35. 35)
      • X. Li , Z. Jia , P. Zhang , R. Zhang , H. Wang . Trust-based on-demand multi path routing in mobile ad hoc networks. IET Special Issue on Multi-Agent Distrib. Inf. Secur. , 4 , 212 - 232
    36. 36)
      • Douceur, J.R.: `The Sybil attack', Proc. Int. Workshop on Peer-to-Peer Systems, March 2002, Cambridge, MA, USA, p. 251–260.
    37. 37)
      • A.A. Pirzada , C. McDonald , X.Y. Cheng , D.Y. Li . (2006) Reliable routing in , Advances in .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2011.0042
Loading

Related content

content/journals/10.1049/iet-wss.2011.0042
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address