http://iet.metastore.ingenta.com
1887

Cooperative communications based on trust model for mobile ad hoc networks

Cooperative communications based on trust model for mobile ad hoc networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Wireless networks provide a realm in which cooperation among large numbers of egoists can be attained. As the non-cooperative behaviours of nodes will significantly degrade the network performance, effective cooperation incentive of nodes has become a hot issue in cooperative communication. Although a reputation system can stimulate nodes to cooperate with each other, the recommendation-based trust model may cause a decline in network performance, because of fake recommendation, convergence of iteration and node redemption. To address the above issues, a topology transform-based recommendation trust model is proposed to relieve the malicious effects on the accuracy of recommendation trust, which stem from fake recommendation. Some mathematical analysis and simulation results reveal that the global trust of this proposed trust model has convergence characteristic, and the reputation system with this model can more effectively stimulate node cooperation and performs better in terms of packet successful delivery ratio and mean number of packets dropped. Moreover, the topology transform-based recommendation trust algorithm makes this reputation system more suitable for large-scale networks.

References

    1. 1)
      • Caronni, G.: `Walking the web of trust', Proc. IEEE Ninth Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises', 2000, p. 153–159.
    2. 2)
      • F.H. Fitzek , M.D. Katz . (2006) Cooperation in wireless networks: principles and applications.
    3. 3)
      • Buchegger, S., Le Boudec, J.Y.: `Performance analysis of the CONFIDANT (cooperation of nodes-fairness in dynamic ad-hoc networks) protocol', Proc. Third ACM Int. Symp. on Mobile MANET Networking and Computing (MobiHoc 2002), June 2002, Lausanne, Switzerland, p. 80–91.
    4. 4)
      • Michiardi, P., Molva, R.: `CORE: A COllaborative REputation mechanism to enforce node cooperation in mobile ', IFIP – Communication and Multimedia Security Conf., September 2002, Portoroz, Slovenia, p. 107–121.
    5. 5)
      • He, Q., Wu, D., Khosla, P.: `SORI: a secure and objective reputation-based incentive scheme for ', Proc. IEEE Wireless Communications and Networking Conf. (WCNC 2004), March 2004, Atlanta, GA, 2, p. 825–830.
    6. 6)
    7. 7)
      • Zhang, M.W., Yang, B., Qi, Y.: `Using trust metric to detect malicious behaviors in WSNs', Proc. Eighth ACIS Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, July 2007, Qingdao, China, p. 104–108.
    8. 8)
      • Khambatti, M., Dasgupta, P.: `A role-based trust model for peer to peer communities and dynamic coalitions', Proc. Second IEEE Int. Information Assurance Workshop, April 2004, Charlotte, North Carolina, USA, p. 141–154.
    9. 9)
      • G.L. Millan , M.G. Perez , G.M. Perez . PKI-based trust management in inter-domain scenarios. Comput. Secur. , 2 , 278 - 290
    10. 10)
    11. 11)
      • E. ElSalamouny , K.T. Krukow , V. Sassone . An analysis of the exponential decay principle in probabilistic trust models. Theor. Comput. Sci. , 4067 - 4084
    12. 12)
      • M. Omar , Y. Challal , A. Bouabdallah . Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. , 3 , 199 - 214
    13. 13)
      • Kamvar, S.D., Schlosser, M.T.: `EigenRep: reputation management in P2P networks', Proc. 12th Int. World Wide Web Conf., Budapest, May 2003, p. 123–134.
    14. 14)
      • W. Dou , H.-M. Wang , Y. Jia , P. Zou . A recommendation-based peer-to-peer trust model. J. Softw. , 4 , 571 - 583
    15. 15)
      • Z.X. Sun , Y.W. Tang . Multilayer and grouping P2P trust model based on global reputation. J. Commun. , 9 , 133 - 140
    16. 16)
      • Raya, M., Papadimitratos, P., Gligor, V.D.: `On data-centric trust establishment in ephemeral ', The 27th Conf. on Computer Communications (INFOCOM08), April 2008, Phoenix, AZ, USA, p. 1238–1246.
    17. 17)
      • Wang, M., Wu, A.: `Trust approach for node cooperation in MANET', Proc. Third Int. Conf. on Mobile Ad-hoc and Sensor Network, 2007 (LNCS, 4864), p. 481–491.
    18. 18)
      • Levien, R., Aiken, A.: `Attack-resistant trust metrics for public key certification', Proc. Seventh USENIX Security Symp., 1998, San Antonio, TX, p. 229–242.
    19. 19)
      • Mui, L.: `Computational models of trust and reputation: agents, evolutionary games, and social networks', 2003, PhD, MIT, Massachusetts.
    20. 20)
      • F.G. Marmol , G.M. Perez . Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. , 7 , 545 - 556
    21. 21)
      • Dellarocas, C.: `Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems', Proc. Int. Conf. on Intelligent Systems (ICIS00), 2000, Brisbane, Queensland, Australia, p. 520–525.
    22. 22)
      • Douceur, J.R., Donath, J.S.: `The Sybil attack', Proc. First Int. Workshop on Peer-to-Peer Systems (IPTPS02), 2002, p. 251–260.
    23. 23)
      • P. Resnick , R. Zeckhauser , E. Friedman . Reputation system. Commun. ACM , 12 , 45 - 48
    24. 24)
      • Peng, S.F., He, J.S., Meng, Y.: `Reputation-based trust update in network environment', Proc. 2008 Int. Symp. on Electronic Commerce and Security (ISECS08), 2008, Guangzhou, China, p. 118–123.
    25. 25)
      • P. Victor , C. Cornelis , M. De Derk . Gradual trust and distrust in recommender systems. Fuzzy Sets Syst. , 1367 - 1382
    26. 26)
      • J.H. Luo , X. Liu , M.Y. Fan . A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput. Netw. , 14 , 2396 - 2407
    27. 27)
      • Liu, J.S., Issarny, V.: `Enhanced reputation mechanism for mobile ad-hoc networks', Proc. Second Int. Conf. on Trust Management (iTrust’04), March 2004, Oxford, UK, 2995, p. 48–62.
    28. 28)
      • Li, X.M., Wang, J.K.: `A global trust model of P2P network based on distance-weighted recommendation', Proc. 2009 IEEE Int. Conf. on Networking, Architecture, and Storage (ICNAS’09), July 2009, Zhang Jia Jie, Hunan, China, p. 281–284.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0056
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0056
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address