Loading…
Novel approach of distributed & adaptive trust metrics for MANET
It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust met...
Saved in:
Published in: | Wireless networks 2019-08, Vol.25 (6), p.3587-3603 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3 |
container_end_page | 3603 |
container_issue | 6 |
container_start_page | 3587 |
container_title | Wireless networks |
container_volume | 25 |
creator | Zhang, De-gan Gao, Jin-xin Liu, Xiao-huan Zhang, Ting Zhao, De-xin |
description | It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation. |
doi_str_mv | 10.1007/s11276-019-01955-2 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2194434587</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2194434587</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWD_-gKeA4C2ar91NbpZSP6DWSz2H7GaiW9rummQL_ntTV_DmYZiBed93hgehK0ZvGaXVXWSMVyWhTB-qKAg_QhNWVJwopsvjPFPOCaVCnaKzGNeUUiW0nqD7ZbeHDbZ9HzrbfODOY9fGFNp6SODwDbbO9qndA05hiAlvIe-aiH0X8Mt0OV9doBNvNxEuf_s5enuYr2ZPZPH6-DybLkgjmE5EUV9bW7jSSgWVc9IJYB5cpUA2rnYgavDgmROOZ0ldy6YsS-u0LYXy2olzdD3m5kc_B4jJrLsh7PJJw5mWUshCVVnFR1UTuhgDeNOHdmvDl2HUHEiZkZTJlMwPKcOzSYymmMW7dwh_0f-4vgGye2yS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2194434587</pqid></control><display><type>article</type><title>Novel approach of distributed & adaptive trust metrics for MANET</title><source>ABI/INFORM Global (ProQuest)</source><source>Springer Nature</source><creator>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</creator><creatorcontrib>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</creatorcontrib><description>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-019-01955-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communications Engineering ; Computer Communication Networks ; Data transmission ; Electrical Engineering ; Energy ; Engineering ; Experiments ; Fuzzy sets ; IT in Business ; Mathematical analysis ; Methods ; Mobile ad hoc networks ; Network reliability ; Networks ; Nodes ; Packets (communication) ; Recommender systems ; Residual energy ; Wireless networks</subject><ispartof>Wireless networks, 2019-08, Vol.25 (6), p.3587-3603</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Wireless Networks is a copyright of Springer, (2019). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</citedby><cites>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2194434587/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2194434587?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Zhang, De-gan</creatorcontrib><creatorcontrib>Gao, Jin-xin</creatorcontrib><creatorcontrib>Liu, Xiao-huan</creatorcontrib><creatorcontrib>Zhang, Ting</creatorcontrib><creatorcontrib>Zhao, De-xin</creatorcontrib><title>Novel approach of distributed & adaptive trust metrics for MANET</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</description><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data transmission</subject><subject>Electrical Engineering</subject><subject>Energy</subject><subject>Engineering</subject><subject>Experiments</subject><subject>Fuzzy sets</subject><subject>IT in Business</subject><subject>Mathematical analysis</subject><subject>Methods</subject><subject>Mobile ad hoc networks</subject><subject>Network reliability</subject><subject>Networks</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Recommender systems</subject><subject>Residual energy</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kE1LAzEQhoMoWD_-gKeA4C2ar91NbpZSP6DWSz2H7GaiW9rummQL_ntTV_DmYZiBed93hgehK0ZvGaXVXWSMVyWhTB-qKAg_QhNWVJwopsvjPFPOCaVCnaKzGNeUUiW0nqD7ZbeHDbZ9HzrbfODOY9fGFNp6SODwDbbO9qndA05hiAlvIe-aiH0X8Mt0OV9doBNvNxEuf_s5enuYr2ZPZPH6-DybLkgjmE5EUV9bW7jSSgWVc9IJYB5cpUA2rnYgavDgmROOZ0ldy6YsS-u0LYXy2olzdD3m5kc_B4jJrLsh7PJJw5mWUshCVVnFR1UTuhgDeNOHdmvDl2HUHEiZkZTJlMwPKcOzSYymmMW7dwh_0f-4vgGye2yS</recordid><startdate>20190801</startdate><enddate>20190801</enddate><creator>Zhang, De-gan</creator><creator>Gao, Jin-xin</creator><creator>Liu, Xiao-huan</creator><creator>Zhang, Ting</creator><creator>Zhao, De-xin</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20190801</creationdate><title>Novel approach of distributed & adaptive trust metrics for MANET</title><author>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data transmission</topic><topic>Electrical Engineering</topic><topic>Energy</topic><topic>Engineering</topic><topic>Experiments</topic><topic>Fuzzy sets</topic><topic>IT in Business</topic><topic>Mathematical analysis</topic><topic>Methods</topic><topic>Mobile ad hoc networks</topic><topic>Network reliability</topic><topic>Networks</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Recommender systems</topic><topic>Residual energy</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, De-gan</creatorcontrib><creatorcontrib>Gao, Jin-xin</creatorcontrib><creatorcontrib>Liu, Xiao-huan</creatorcontrib><creatorcontrib>Zhang, Ting</creatorcontrib><creatorcontrib>Zhao, De-xin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI商业信息数据库</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Science Database (ProQuest)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, De-gan</au><au>Gao, Jin-xin</au><au>Liu, Xiao-huan</au><au>Zhang, Ting</au><au>Zhao, De-xin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Novel approach of distributed & adaptive trust metrics for MANET</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2019-08-01</date><risdate>2019</risdate><volume>25</volume><issue>6</issue><spage>3587</spage><epage>3603</epage><pages>3587-3603</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-019-01955-2</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2019-08, Vol.25 (6), p.3587-3603 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_journals_2194434587 |
source | ABI/INFORM Global (ProQuest); Springer Nature |
subjects | Communication Communications Engineering Computer Communication Networks Data transmission Electrical Engineering Energy Engineering Experiments Fuzzy sets IT in Business Mathematical analysis Methods Mobile ad hoc networks Network reliability Networks Nodes Packets (communication) Recommender systems Residual energy Wireless networks |
title | Novel approach of distributed & adaptive trust metrics for MANET |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T14%3A11%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Novel%20approach%20of%20distributed%20&%20adaptive%20trust%20metrics%20for%20MANET&rft.jtitle=Wireless%20networks&rft.au=Zhang,%20De-gan&rft.date=2019-08-01&rft.volume=25&rft.issue=6&rft.spage=3587&rft.epage=3603&rft.pages=3587-3603&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-019-01955-2&rft_dat=%3Cproquest_cross%3E2194434587%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2194434587&rft_id=info:pmid/&rfr_iscdi=true |