Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

AbstractDue to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of ‘trust’ into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node’s historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node’s trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance.

[1]  Mehdi Rahimi,et al.  On local entropy of fuzzy partitions , 2014, Fuzzy Sets Syst..

[2]  Edwin Hsing-Mean Sha,et al.  Research of trust model based on fuzzy theory in mobile ad hoc networks , 2014, IET Inf. Secur..

[3]  Shukor Abd Razak,et al.  Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..

[4]  Ilango Krishnamurthi,et al.  Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks , 2014 .

[5]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[6]  Jiankun Hu,et al.  Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  Sunilkumar S. Manvi,et al.  Multicast routing in mobile ad hoc networks by using a multiagent system , 2008, Inf. Sci..

[8]  Rami Bahsoon,et al.  Trust Dynamics: A Data-Driven Simulation Approach , 2011, IFIPTM.

[9]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[10]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[11]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[12]  Edwin Hsing-Mean Sha,et al.  Impact of trust model on on-demand multi-path routing in mobile ad hoc networks , 2013, Comput. Commun..

[13]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[14]  Gin-Der Wu,et al.  An enhanced discriminability recurrent fuzzy neural network for temporal classification problems , 2014, Fuzzy Sets Syst..

[15]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[16]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..

[17]  Xin Yang,et al.  cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[18]  Edwin Hsing-Mean Sha,et al.  Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model , 2012, Comput. Commun..

[19]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[20]  James Lam,et al.  Necessary and Sufficient Conditions for Analysis and Synthesis of Markov Jump Linear Systems With Incomplete Transition Descriptions , 2010, IEEE Transactions on Automatic Control.

[21]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.

[22]  Jin-Hee Cho,et al.  On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.

[23]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..