A dynamic trust updating model based on multiple constraints in wireless mesh networks

Due to their distributed nature, wireless mesh networks (WMNs) are vulnerable to various attacks, resulting in untrusted communications. To achieve trusted communications, it is important to build a trust model for executions in a self-organizing and decentralized network environment. However, due to high dynamic and low stability of the nodes, such model is difficult to build for WMNs. In this paper, we propose a new dynamic trust updating model (DTUM) in WMNs, taking into consideration of multiple constraints. Our contributions are in two folds: (1) to ensure that the increase of trust should be slow and the drop of trust should be fast, similar to the trust building process in the real human society; (2) to ensure that the trust fades with time, describing the nature of trust. The effectiveness of our approach is validated through quantitative evaluation analysis.

[1]  Xi Li,et al.  RePro: A Reputation-based Proactive Routing Protocol for the Wireless Mesh Backbone , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[2]  Weijia Jia,et al.  Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[3]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[4]  Charles E. Perkins,et al.  The Ad Hoc on-demand distance-vector protocol , 2001 .

[5]  David Heckerman,et al.  A Tutorial on Learning with Bayesian Networks , 1998, Learning in Graphical Models.

[6]  Mewada Shivlal,et al.  Performance Analysis of Secure Wireless Mesh Networks , 2012 .

[7]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Santosh Biswas,et al.  MCDM based trust model for secure routing in Wireless Mesh Networks , 2011, 2011 World Congress on Information and Communication Technologies.

[9]  Jie Wu,et al.  Paper Special Section on Trust, Security and Privacy for Pervasive Applications Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-hoc Networks , 2022 .

[10]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Zaobin Gan,et al.  A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[14]  Jie Wu,et al.  Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[15]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[16]  Ding Xuyang,et al.  Trust Evaluation Based Reliable Routing in Wireless Mesh Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[17]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[18]  Li Xu,et al.  Role Based Privacy-Aware Secure Routing in WMNs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[20]  Kurt Rothermel,et al.  Architecture and Algorithms for a Distributed Reputation System , 2003, iTrust.

[21]  Neco Ventura,et al.  A metric to increase throughput in untrustworthy multi-hop wireless mesh networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..