Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs

A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced routing protocol could provide a better quality of service. In this study, we abstract a basic decentralized effective trust inference model based on node's behavior assessment, where each peer assigns a trust value for a set of peers of interest. In this model, we introduce the 'voting' mechanism to access the recommending experience (or ratings), in order to reduce the cost of the algorithm design and the system overhead. Then combined with this trust model, a novel trust-enhanced multicast routing protocol (TeMR) is proposed. This new protocol introduces the group-shared tree strategy, which establishes more efficient multicast routes since it uses 'trust' factor to improve the efficiency and robustness of the forwarding tree. Moreover, it provides a flexible and feasible approach in routing decision making with trust constraint and malicious node detection. Experiments have been conducted to evaluate the effectiveness of the proposed protocol.

[1]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[2]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[3]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[4]  Sunilkumar S. Manvi,et al.  Multicast routing in mobile ad hoc networks by using a multiagent system , 2008, Inf. Sci..

[5]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..

[6]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.

[7]  Jin-Hee Cho,et al.  On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.

[8]  Ilango Krishnamurthi,et al.  Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks , 2014 .

[9]  Nabendu Chaki,et al.  TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks , 2012, CISIM.

[10]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[11]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[12]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[13]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[14]  Rami Bahsoon,et al.  Trust Dynamics: A Data-Driven Simulation Approach , 2011, IFIPTM.