Trusted Spanning Tree for Delay Tolerant MANETs

Quality of service (QoS) is an important issue in delay tolerant mobile ad-hoc networks (DTMs). This work attempts to improve the QoS in DTMs by relying on spanning forests algorithms. The existing algorithms are improved by introducing the notion of trust and choosing the most robust (trustable) spanning trees among existing opportunities. The robustness/quality of the tree can be assessed based on two cost functions. In order to improve QoS in a DTM, a greedy-based heuristic is proposed to the existing algorithms and becomes G-TRUST. To aid efficient break away of low-trust node, another heuristic, BREAK heuristic, is further incorporated to G-TRUST (G-TRUST BREAK). Simulation on realistic mobility models were carried out on both G-TRUST and G-TRUST BREAK. Their results verified the advantages of incorporating these heuristics.

[1]  Serge Chaumette,et al.  Dynamicity Aware Graph Relabeling Systems (DA-GRS), A Local Computation based Model to Describe Manet Algorithms , 2005, IASTED PDCS.

[2]  Shay David,et al.  Six degrees of reputation: The use and abuse of online review and recommendation systems , 2006, First Monday.

[3]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[4]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey: Research Articles , 2006 .

[5]  Luc Hogie,et al.  Mobile Ad Hoc Networks: Modelling, Simulation and Broadcast-based Applications. (Réseaux Mobile Ad hoc : modélisation, simulation et applications de diffusion) , 2007 .

[6]  Sangheethaa Sukumaran,et al.  Reputation Based Localized Access Control for Mobile Ad-Hoc Networks , 2006, ADHOC-NOW.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[9]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[10]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[11]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..

[12]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[13]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[14]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[15]  Marcin Seredynski,et al.  Preventing selfish behavior in Ad Hoc networks , 2007, 2007 IEEE Congress on Evolutionary Computation.

[16]  Arnaud Casteigts,et al.  Model Driven capabilities of the DA-GRS model , 2006, International Conference on Autonomic and Autonomous Systems (ICAS'06).