DocumentCode :
1384345
Title :
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
Author :
Xia, Hua ; Jia, Zhidong ; Ju, Lin ; Zhu, Yujia
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Volume :
1
Issue :
4
fYear :
2011
fDate :
12/1/2011 12:00:00 AM
Firstpage :
248
Lastpage :
266
Abstract :
Owing to the openness in network topology and the absence of centralised administration in management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious nodes. In order to decrease the hazards from these malicious nodes, the authors incorporate the concept of trust into the MANET, and build a trust management model which is divided into two parts: subjective trust evaluation model and trusted routing model. In subjective trust evaluation model, the credibility of nodes can be evaluated using analytic hierarchy process theory and fuzzy logic rules prediction method. Based on the fuzzy dynamic programming theory, in trusted routing model, the authors present a novel trusted routing algorithm which can kick out the untrustworthy nodes in order to obtain a reliable passage delivery route. As an application of the proposed trusted routing algorithm, a novel reactive routing protocol on the basis of the standard dynamic source routing protocol, called fuzzy trusted dynamic source routing (FTDSR) protocol is proposed. Several experiments have been conducted to evaluate the efficiency of the protocol in malicious node identification and attack resistance. The experimental results show that FTDSR can effectively detect the malicious nodes that guarantee the packet delivery ratio and the network throughput.
Keywords :
decision making; dynamic programming; fuzzy set theory; mobile ad hoc networks; mobility management (mobile radio); routing protocols; telecommunication network reliability; telecommunication network topology; telecommunication security; MANET; analytic hierarchy process theory; attack resistance; fuzzy dynamic programming theory; fuzzy logic rules prediction method; fuzzy trusted dynamic source routing protocol; malicious node identification; mobile ad hoc network; network throughput; network topology; packet delivery ratio; passage delivery route; reactive routing protocol; standard dynamic source routing protocol; subjective trust evaluation model; trust management model; trusted routing model;
fLanguage :
English
Journal_Title :
Wireless Sensor Systems, IET
Publisher :
iet
ISSN :
2043-6386
Type :
jour
DOI :
10.1049/iet-wss.2011.0042
Filename :
6088075
Link To Document :
بازگشت