A multidimensional trust evaluation model for MANETs

Abstract Effective trust management can enhance nodes' cooperation in selecting trustworthy and optimal paths between the source and destination nodes in mobile ad hoc networks (MANETs). It allows the wireless nodes (WNs) in a MANET environment to deal with uncertainty about the future actions of other participants. The main challenges in MANETs are time-varying network architecture due to the mobility of WNs, the presence of attack-prone nodes, and extreme resource limitations. In this paper, an energy-aware and social trust inspired multidimensional trust management model is proposed to achieve enhanced quality of service (QoS) parameters by overcoming these challenges. The trust management model calculates the trust value of the WNs through peer to peer and link evaluations. Energy and social trust are utilized for peer to peer evaluation, while an optimal routing path with a small number of intermediate nodes with minimum acceptable trust value is used for evaluation of the link. Empirical analysis reveals that the proposed trust model is robust and accurate in comparison to the state-of-the-art model for MANETs.

[1]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[2]  Gautam M. Borkar,et al.  A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks , 2017, Wirel. Networks.

[3]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[4]  Kun Yang,et al.  Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges , 2013, IEEE Communications Surveys & Tutorials.

[5]  Keshav P. Dahal,et al.  Social factors for data sparsity problem of trust models in MANETs , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[6]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[7]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[8]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[9]  Edwin Hsing-Mean Sha,et al.  Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[10]  P. Yogesh,et al.  TRUNCMAN: Trust based routing mechanism using non-cooperative movement in mobile ad-hoc network , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[11]  Li Yu,et al.  Ad-hoc multi-dimensional trust evaluation model based on classification of service , 2010, 2010 5th International ICST Conference on Communications and Networking in China.

[12]  Zheng Yan,et al.  A Survey on Trust Evaluation in Mobile Ad Hoc Networks , 2016, MobiMedia.

[13]  Ananthram Swami,et al.  Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks , 2017, IEEE Transactions on Services Computing.

[14]  Amir Hussain,et al.  A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications , 2018, Cognitive Computation.

[15]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[16]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[17]  Chunyan Miao,et al.  Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[18]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[19]  Antonella Molinaro,et al.  Forwarding strategies in named data wireless ad hoc networks: Design and evaluation , 2015, J. Netw. Comput. Appl..

[20]  Krishan Kumar,et al.  A review of QoS routing protocols in MANETs , 2013 .

[21]  Santosh Biswas,et al.  MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..

[22]  Mohammed M. Alani MANET security: A survey , 2014, 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014).

[23]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[24]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[25]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[26]  Leandros Tassiulas,et al.  Social network analysis concepts in the design of wireless Ad Hoc network protocols , 2010, IEEE Network.

[27]  Zhongshan Zhang,et al.  Self-Organization Based Clustering in MANETs Using Zone Based Group Mobility , 2017, IEEE Access.

[28]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[29]  Peng Liu,et al.  A Novel Hybrid Trust Management Framework for MANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[30]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[31]  Todd R. Andel,et al.  Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.

[32]  M. Shamim Kaiser,et al.  Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey , 2016, J. Netw. Comput. Appl..

[33]  Weixin Ling,et al.  An Adaptive Parameter Control Strategy for Ant Colony Optimization , 2007 .

[34]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[35]  Ankit Agrawal,et al.  A review & impact of Trust Schemes in MANET , 2016 .

[36]  Gyanappa A. Walikar,et al.  A survey on hybrid routing mechanisms in mobile ad hoc networks , 2017, J. Netw. Comput. Appl..

[37]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[38]  Keshav P. Dahal,et al.  Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc Networks , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[39]  Feng Zhou,et al.  A multi-dimensional trust evaluation model for large-scale P2P computing , 2011, J. Parallel Distributed Comput..

[40]  Adnan Ahmed Khan,et al.  Detection of dishonest trust recommendations in mobile ad hoc networks , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[41]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for Mobile Ad-Hoc Networks with liars , 2008, Perform. Evaluation.

[42]  Keshav P. Dahal,et al.  Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.