Wireless Ad-hoc networks: Using fuzzy trust approach to improve security between nodes

A wireless Ad-hoc network is a collection of mobile nodes that can be deployed without the need for any centralized management infrastructure. The operation of Ad-hoc networks depends on the cooperation among nodes to provide connectivity and communication routes. However, such an ideal situation may not always be achievable in practice. Some nodes may behave maliciously, resulting in degradation of the performance of the network or even disruption of its operation altogether. To mitigate the effect of such nodes and to achieve higher levels of security and reliability, this paper expands on relevant fuzzy logic concepts to propose an algorithm to establish quantifiable trust levels between the nodes of Ad-hoc networks. These trust levels are then used in the routing decision making process. Using OPNET simulator, the proposed algorithm is validated and further studied. The findings show that when the proposed algorithm is utilised, the overall performance of the Ad-hoc network is significantly improved.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  T. Fowler Mesh networks for broadband access , 2001 .

[3]  Sabah Jassim,et al.  The effects of malicious nodes on performance of mobile ad hoc networks , 2006, SPIE Defense + Commercial Sensing.

[4]  Nitin H. Vaidya,et al.  Priority Scheduling in Wireless Ad Hoc Networks , 2002, MobiHoc '02.

[5]  Tadeusz A. Wysocki,et al.  Wireless ad-hoc networks : employing behaviour history to combat malicious nodes , 2008 .

[6]  Vijay Varadharajan,et al.  Trust and Recommendations in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).

[7]  Ke Zhong-wu Application of OPNET in the network project and design , 2004 .

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[9]  T. Aaron Gulliver,et al.  AD-HOC WIRELESS NETWORK ROUTING PROTOCOLS AND IMPROVED AODV , 2003 .

[10]  Upkar Varshney,et al.  Mobile and wireless networks: services, evolution and issues , 2006, Int. J. Mob. Commun..

[11]  Mohammed Boulmalf,et al.  On the Impact of Security on the Performance of WLANs , 2007, J. Commun..

[12]  N. Meghanathan A simulation study on the stability-oriented routing protocols for mobile ad hoc networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[13]  Samia Nefti-Meziani,et al.  A fuzzy trust model for e-commerce , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[14]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[15]  Syed Ali Jafar,et al.  Too much mobility limits the capacity of wireless ad-hoc networks , 2005, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[16]  C. T. Mallett,et al.  Perspectives on next generation mobile , 2006 .

[17]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .