Skip to main content
Log in

DATM: a dynamic attribute trust model for efficient collaborative routing

  • S.I.: Queueing Theory and Network Applications
  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

In the context of Intermittently Connected Mobile Networks, researchers have proposed different collaborative routing schemes with fundamental objectives to maximize packets delivery, and minimise latency through improving peers’ routing decisions. One promising approach adopted by researchers to improve peers’ routing decisions is a trust-based routing mechanism. Most current trust-based protocols in the literature enable peers to make routing decisions based on trust relationships that manifest among peers but with less concern about the peers’ attributes. This further made the design of efficient, collaborative routing protocols a challenging task due to the high dynamics of peers’ characteristics and mobility. In this paper, we hypothesise that in a trust-based routing protocol, it will be additional trust evaluation reliability if peers can take into consideration their partners attributes’ status in addition to the trust relationships. We propose DATM protocol; a trust-based scheme to enforce collaborative behaviour in wireless mobile networks taking into consideration the peers’ attributes for an efficient routing scheme. We introduce a personalised similarity algorithm for peers’ attributes modelling as a scaling factor for trust evaluation. The relative comparison of the DATM and PROPHET protocol using simulation shows the improved performance of our proposed model in terms of messages delivery, messages overhead and average latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Abdalla, M. O., Nagarajan, T., & Hashim, F. M. (2013). Analysis of innovative design of energy efficient hydraulic actuators. Analysis, 3(1), 001–007.

    Google Scholar 

  • Ahmed, A., Abu Bakar, K., Channa, M. I., Haseeb, K., Khan, A. W., & Khan, A. W. (2015). Terp: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.

    Article  Google Scholar 

  • Anantvalee, T., & Wu, J. (2007). Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In 2007 IEEE international conference on communications (pp. 3383–3388). IEEE.

  • Bello, A., Liu, W., Bai, Q., & Narayanan, A. (2015a). Exploring the role of structural similarity in securing smart metering infrastructure. In 2015 IEEE international conference on data science and data intensive systems (pp. 343–349). IEEE.

  • Bello, A., Liu, W., Bai, Q., & Narayanan, A.(2015b). Revealing the role of topological transitivity in efficient trust and reputation system in smart metering network. In 2015 IEEE international conference on data science and data intensive systems (pp. 337–342). IEEE.

  • Canca, D., De-Los-Santos, A., Laporte, G., & Mesa, J. A. (2016). A general rapid network design, line planning and fleet investment integrated model. Annals of Operations Research, 246(1–2), 127–144.

    Article  Google Scholar 

  • Chen, I.-R., Bao, F., Chang, M. J., & Cho, J.-H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.

    Article  Google Scholar 

  • Crosby, G. V., Hester, L., & Pissinou, N. (2011). Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. IJ Network Security, 12(2), 107–117.

    Google Scholar 

  • Dai, H., Jia, Z., & Qin, Z. (2009). Trust evaluation and dynamic routing decision based on fuzzy theory for manets. Journal of Software, 4(10), 1091–1101.

    Article  Google Scholar 

  • Duan, J., Gao, D., Yang, D., Foh, C. H., & Chen, H.-H. (2014). An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet of Things Journal, 1(1), 58–69.

    Article  Google Scholar 

  • Esposito, C., Castiglione, A., Palmieri, F., & Ficco, M. (2015). Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design. Future Generation Computer Systems, 74, 325–336.

    Article  Google Scholar 

  • Ho, J.-W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.

    Article  Google Scholar 

  • Jiang, D., Ying, X., Han, Y., & Lv, Z. (2016). Collaborative multi-hop routing in cognitive wireless networks. Wireless Personal Communications, 86(2), 901–923.

    Article  Google Scholar 

  • Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web (pp. 640–651). New York: ACM.

  • Kapoukakis, A., Pappas, C., Androulidakis, G., & Papavassiliou, S. (2013). Design and assessment of a reputation-based trust framework in wireless testbeds utilizing user experience. In Ad-hoc, mobile, and wireless network (pp. 1–12). Berlin: Springer.

  • Keränen, A., Ott, J., & Kärkkäinen, T. (2009). The ONE simulator for DTN protocol evaluation. In SIMUTools ’09: Proceedings of the 2nd international conference on simulation tools and techniques, New York, NY, USA. New York: ICST.

  • Krifa, A., Barakat, C., & Spyropoulos, T. (2008). Optimal buffer management policies for delay tolerant networks. In 2008 5th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (pp. 260–268). IEEE.

  • Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4), 1497–1509.

    Article  Google Scholar 

  • Lindgren, A., Doria, A., & Schelen, O.(2004). Probabilistic routing in intermittently connected networks. In P. Dini, P. Lorenz & J. Neuman de Souza (Eds.), Service assurance with partial and intermittent resources (pp. 239–254). Berlin: Springer.

  • Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12), 103–109.

    Article  Google Scholar 

  • Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353(1), 153–181.

    Google Scholar 

  • Mari, F., Melatti, I., Tronci, E., & Finzi, A. (2013). A multi-hop advertising discovery and delivering protocol for multi administrative domain manet. Mobile Information Systems, 9(3), 261–280.

    Article  Google Scholar 

  • Naseer, A. R. (2012). Reputation system based trust-enabled routing for wireless sensor networks. New York: INTECH Open Access Publisher.

    Google Scholar 

  • Palazzi, C. E., & Bujari, A. (2012). Social-aware delay tolerant networking for mobile-to-mobile file sharing. International Journal of Communication Systems, 25(10), 1281–1299.

    Article  Google Scholar 

  • Prasad, R. S., Dovrolis, C., & Thottan, M. (2007). Router buffer sizing revisited: the role of the output/input capacity ratio. In Proceedings of the 2007 ACM CoNEXT conference (p. 15). New York: ACM.

  • Rezgui, A., & Eltoweissy, M. (2007). Tarp: A trust-aware routing protocol for sensor-actuator networks. In IEEE international conference on mobile adhoc and sensor systems, 2007. MASS 2007 (pp. 1–9). IEEE.

  • Stefanello, F., Buriol, L. S., Hirsch, M. J., Pardalos, P. M., Querido, T., Resende, M. G. C., et al. (2017). On the minimization of traffic congestion in road networks with tolls. Annals of Operations Research, 249(1), 119–139.

    Article  Google Scholar 

  • Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.

    Article  Google Scholar 

  • Tan, H. C., Ma, M., Labiod, H., Chong, P. H. J., & Zhang, J. (2016). A non-biased trust model for wireless mesh networks. International Journal of Communication Systems, 30, 1–18.

  • Tavakolifard, M. (2012). On some challenges for online trust and reputation systems. Doctoral Thesis, Norwegian University of Science and Technology, Trondheim, p. 211.

  • Usman, A. B., & Gutierrez, J. (2016). A reliability-based trust model for efficient collaborative routing in wireless networks. In Proceedings of the 11th international conference on Queueing theory and network applications, QTNA ’16 (pp. 15:1–15:7), New York, NY, USA. New York: ACM.

  • Usman, A. B., Liu, W., Bai, Q., & Narayanan, A. (2015). Trust of the same: Rethinking trust and reputation management from a structural homophily perspective. International Journal of Information Security and Privacy (IJISP), 9(2), 13–30.

    Article  Google Scholar 

  • Vahdat, A., Becker, D. (2000). Epidemic routing for partially-connected ad hoc networks.

  • Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.

    Article  Google Scholar 

  • Xia, F., Liu, L., Li, J., Ma, J., & Vasilakos, A. V. (2015). Socially aware networking: A survey. IEEE Systems Journal, 9(3), 904–921.

    Article  Google Scholar 

  • Ye, D., Zhang, M., & Yang, Y. (2015). A multi-agent framework for packet routing in wireless sensor networks. Sensors, 15(5), 10026–10047.

    Article  Google Scholar 

  • Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aminu Bello Usman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Usman, A.B., Gutierrez, J. DATM: a dynamic attribute trust model for efficient collaborative routing. Ann Oper Res 277, 293–310 (2019). https://doi.org/10.1007/s10479-018-2864-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-018-2864-5

Keywords

Navigation