Resources-aware trusted node selection for content distribution in mobile ad hoc networks
- 293 Downloads
We propose a novel trust and probabilistic node selection mechanism for content distribution in mobile ad hoc networks. Due to the open nature of such networks which as a rule do not have strict node membership control, the selection of trustworthy nodes is an important challenge, especially as the resources (e.g., battery, bandwidth) of the mobile devices are limited and should not be wasted on erroneous or malicious content. Our proposal, in addition to considering the trustworthiness of nodes, ensures that the traffic load is equally shared amongst the population of nodes, thus further conserving mobile node resources. We analyse the proposed mechanisms and evaluate it against selected previously proposed trust schemes which, in the majority, favour the selection of the most trustworthy node. We demonstrate the benefits of our proposal which provides load balancing and prevents overuse of a single node’s resources, while still providing a good performance in regards to accurately choosing trustworthy nodes to provide the required content.
KeywordsAd-hoc networks Node selection Trust evaluation Resource-aware mechanisms
This research work has been supported by funding from National ICT Australia (NICTA). NICTA is a research organization funded by Australian Government research initiatives through Australian Research Council (ARC). The authors would like to thank Henrik Petander for providing his data-sets for the power consumption of Google Android phones.
- 2.Ries, S., & Heinemann, A. (2008). Analyzing the robustness of certain trust. In Y. Karabulut, J. Mitchell, P. Herrmann & C. Jensen (Eds.), Trust management II, IFIP advances in information and communication technology (pp. 51–67). Boston: Springer.Google Scholar
- 3.Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: Advanced communications and multimedia security, p. 121.Google Scholar
- 4.Buchegger, S. (2004). Coping with misbehaviour in mobile ad-hoc networks. http://infoscience.epfl.ch/record/521/files/sonjaThesis.pdf.
- 5.Shankaran, R., Varadharajan, V., Orgun, M. A., & Hitchens, M. (2009). Context-aware trust management for peer-to-peer mobile ad-hoc networks. Computer Software and Applications Conference, 2, 188–193.Google Scholar
- 6.Wi-Fi Direct, http://www.wi-fi.org/.
- 7.Djatmiko, M., Boreli, R., Seneviratne, A., & Ries, S. (2011). Trust-based content distribution for mobile ad hoc networks, modeling, analysis simulation of computer and telecommunication systems (MASCOTS). 2011 IEEE 19th international symposium on, pp. 433–436.Google Scholar
- 8.ns-2, http://www.isi.edu/nsnam/ns/.
- 9.Petander, H. (2009). Energy-aware network selection using traffic estimation. In Proceedings of the 1st ACM workshop on mobile internet through cellular networks, MICNET ’09, pp. 55–60.Google Scholar
- 10.Li, X., Zhou, F., & Yang, X. (2011). A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 2, 188–193.Google Scholar
- 11.Quercia, D., & Hailes, S. (2007). MATE: Mobility and adaptation with trust and expected-utility. International Journal of Internet Technology and Secured Transactions (IJITST), 1, 43–53.Google Scholar
- 12.Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th international conference on World Wide Web, pp. 640–651.Google Scholar
- 13.Le-Blond, S., Legout, A., & Dabbous, W. (2008). Pushing bittorrent locality to the limit. CoRR. http://arxiv.org/abs/1011.1892.
- 15.Bai, F., Sadagopan, N., & Helmy, A. (2003). IMPORTANT: a framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. INFOCOM, 2, 825–835.Google Scholar
- 16.Lee, K., Hong, S., Kim, S. J., Rhee, I., & Chong, S. (2009). SLAW: A new mobility model for human walks. INFOCOM , 855–863.Google Scholar
- 17.Tournoux, P. -U., Leguay, J., Benbadis, F., Conan, V., de Amorim, M. D., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN routing. INFOCOM , pp. 1116–1124.Google Scholar
- 18.Whitbeck, J., de Amorim, M. D., & Conan, V. (2010). Plausible mobility: Inferring movement from contacts. In Proceedings of the second international workshop on mobile opportunistic networking (MobiOpp ’10), pp 110–117.Google Scholar