4.5 Article

Novel approach of distributed & adaptive trust metrics for MANET

Journal

WIRELESS NETWORKS
Volume 25, Issue 6, Pages 3587-3603

Publisher

SPRINGER
DOI: 10.1007/s11276-019-01955-2

Keywords

Mobile Ad hoc Network; Distributed; Adaptive; Trust metrics; Malicious attacks

Funding

  1. National Natural Science Foundation of China [61571328]
  2. Tianjin Key Natural Science Foundation [18JCZDJC96800]
  3. CSC Foundation [201308120010]
  4. Major projects of science and technology in Tianjin [15ZXDSGX 00050]
  5. Training plan of Tianjin University Innovation Team [TD12-5016, TD13-5025]
  6. Major projects of science and technology for their services in Tianjin [16ZXFWGX00010, 17YFZC GX00360]
  7. Key Subject Foundation of Tianjin [15JC YBJC46500]
  8. Training plan of Tianjin 131 Innovation Talent Team [TD2015-23]

Ask authors/readers for more resources

It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available