Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput.

[1]  Zhang Xue-feng,et al.  Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application , 2009, 2009 Chinese Control and Decision Conference.

[2]  Luo Junhai and Fan Mingyu A Subjective Trust Management Model Based on Certainty-Factor for MANETs , 2010 .

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Ghobad Heidari Medium Access Control Sublayer , 2008 .

[5]  K.J.R. Liu,et al.  Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[6]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Arshad Jhumka,et al.  A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks , 2008, IDC.

[8]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[9]  R. E. Khayata,et al.  A distributed medium access protocol for wireless LANs , 1994, Proceedings of 1994 28th Asilomar Conference on Signals, Systems and Computers.

[10]  Ismet Erkmen,et al.  Fuzzy dynamic programming , 1994, Proceedings of MELECON '94. Mediterranean Electrotechnical Conference.

[11]  Zhiping Jia,et al.  A Subjective Trust Management Model Based on AHP for MANETs , 2011, 2011 International Conference on Network Computing and Information Security.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[14]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[15]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[16]  Tharam S. Dillon,et al.  Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.

[17]  Richard Bellman,et al.  Decision-making in fuzzy environment , 2012 .

[18]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[19]  Christian Damsgaard Jensen,et al.  Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.

[20]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[21]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[22]  Chris McDonald,et al.  Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .

[23]  M.H. Durad,et al.  Two Novel Trust Evaluation Algorithms , 2006, 2006 International Conference on Communications, Circuits and Systems.

[24]  Zhiping Jia,et al.  Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.

[25]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[26]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[27]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[28]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[29]  L. Litwin The medium access control sublayer , 2001 .

[30]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[31]  Guo Wei,et al.  Dynamic trust evaluation based routing model for ad hoc networks , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..

[32]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[33]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[34]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[35]  Georgios Efthymios Theodorakopoulos,et al.  Distributed Trust Evaluation in Ad-Hoc Networks , 2004 .

[36]  J. Martin Leo Manickam,et al.  Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).