4.5 Article

Novel approach of distributed & adaptive trust metrics for MANET

期刊

WIRELESS NETWORKS
卷 25, 期 6, 页码 3587-3603

出版社

SPRINGER
DOI: 10.1007/s11276-019-01955-2

关键词

Mobile Ad hoc Network; Distributed; Adaptive; Trust metrics; Malicious attacks

资金

  1. National Natural Science Foundation of China [61571328]
  2. Tianjin Key Natural Science Foundation [18JCZDJC96800]
  3. CSC Foundation [201308120010]
  4. Major projects of science and technology in Tianjin [15ZXDSGX 00050]
  5. Training plan of Tianjin University Innovation Team [TD12-5016, TD13-5025]
  6. Major projects of science and technology for their services in Tianjin [16ZXFWGX00010, 17YFZC GX00360]
  7. Key Subject Foundation of Tianjin [15JC YBJC46500]
  8. Training plan of Tianjin 131 Innovation Talent Team [TD2015-23]

向作者/读者索取更多资源

It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据