Title :
Recommendation Based Trust Model with an Effective Defence Scheme for MANETs
Author :
Shabut, Antesar M. ; Dahal, Keshav P. ; Bista, Sanat Kumar ; Awan, Irfan U.
Author_Institution :
Sch. of Eng. & Inf., Univ. of Bradford, Bradford, UK
Abstract :
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that adopts recommendations by other nodes in the network is a challenging problem due to the risk of dishonest recommendations like bad-mouthing, ballot-stuffing, and collusion. This paper investigates the problems related to attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme, which utilises clustering technique to dynamically filter out attacks related to dishonest recommendations between certain time based on number of interactions, compatibility of information and closeness between the nodes. The model is empirically tested under several mobile and disconnected topologies in which nodes experience changes in their neighbourhood leading to frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
Keywords :
mobile ad hoc networks; telecommunication network reliability; telecommunication network topology; telecommunication security; trusted computing; clustering technique; defence scheme; delivering packet reliability; disconnected topologies; distributed mobile nodes; dynamic MANET environment; mobile ad hoc networks; mobile topologies; multihop intermediate nodes; packet delivery route; recommendation; trust management; trust model; Computational modeling; Educational institutions; Information filters; Mobile ad hoc networks; Mobile computing; Dishonest recommendation; Trust management models; filtering algorithm; mobile ad hoc networks; recommendation attacks; recommendation management;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2014.2374154