Novel approach of distributed & adaptive trust metrics for MANET
- 100 Downloads
It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.
KeywordsMobile Ad hoc Network Distributed Adaptive Trust metrics Malicious attacks
This research work is supported by National Natural Science Foundation of China (Grant No. 61571328), Tianjin Key Natural Science Foundation (No.18JCZDJC96800), CSC Foundation (No. 201308120010), Major projects of science and technology in Tianjin (No.15ZXDSGX 00050), Training plan of Tianjin University Innovation Team (No.TD12-5016, TD13-5025), Major projects of science and technology for their services in Tianjin (No.16ZXFWGX00010, No.17YFZC GX00360), the Key Subject Foundation of Tianjin (No.15JC YBJC46500), Training plan of Tianjin 131 Innovation Talent Team (No.TD2015-23).
- 14.Nordheimer, K., & Schulze, T. (2010). Trustworthiness in networks: A simulation approach for approximating local trust and distrust values. IEEE Communications Surveys and Tutorials, 321, 157–171.Google Scholar
- 27.Li, G., & Pan, Z. H. (2014). A new anti-collision algorithm for RFID tag. International Journal of Communication Systems, 27(11), 3312–3322.Google Scholar
- 38.Liang, Y. P. (2013). A kind of novel method of service-aware computing for uncertain mobile applications. Mathematical and Computer Modelling, 57(3–4), 344–356.Google Scholar
- 51.Zhao, D. X., Ma, Z., & Zhang, D. G. (2016). A distributed and adaptive trust evaluation algorithm for MANET. ACM MSWiM/Q2SWinet’16, 11, 47–54.Google Scholar