Loading…

Novel approach of distributed & adaptive trust metrics for MANET

It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust met...

Full description

Saved in:
Bibliographic Details
Published in:Wireless networks 2019-08, Vol.25 (6), p.3587-3603
Main Authors: Zhang, De-gan, Gao, Jin-xin, Liu, Xiao-huan, Zhang, Ting, Zhao, De-xin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3
cites cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3
container_end_page 3603
container_issue 6
container_start_page 3587
container_title Wireless networks
container_volume 25
creator Zhang, De-gan
Gao, Jin-xin
Liu, Xiao-huan
Zhang, Ting
Zhao, De-xin
description It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.
doi_str_mv 10.1007/s11276-019-01955-2
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2194434587</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2194434587</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWD_-gKeA4C2ar91NbpZSP6DWSz2H7GaiW9rummQL_ntTV_DmYZiBed93hgehK0ZvGaXVXWSMVyWhTB-qKAg_QhNWVJwopsvjPFPOCaVCnaKzGNeUUiW0nqD7ZbeHDbZ9HzrbfODOY9fGFNp6SODwDbbO9qndA05hiAlvIe-aiH0X8Mt0OV9doBNvNxEuf_s5enuYr2ZPZPH6-DybLkgjmE5EUV9bW7jSSgWVc9IJYB5cpUA2rnYgavDgmROOZ0ldy6YsS-u0LYXy2olzdD3m5kc_B4jJrLsh7PJJw5mWUshCVVnFR1UTuhgDeNOHdmvDl2HUHEiZkZTJlMwPKcOzSYymmMW7dwh_0f-4vgGye2yS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2194434587</pqid></control><display><type>article</type><title>Novel approach of distributed &amp; adaptive trust metrics for MANET</title><source>ABI/INFORM Global (ProQuest)</source><source>Springer Nature</source><creator>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</creator><creatorcontrib>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</creatorcontrib><description>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed &amp; adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-019-01955-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communications Engineering ; Computer Communication Networks ; Data transmission ; Electrical Engineering ; Energy ; Engineering ; Experiments ; Fuzzy sets ; IT in Business ; Mathematical analysis ; Methods ; Mobile ad hoc networks ; Network reliability ; Networks ; Nodes ; Packets (communication) ; Recommender systems ; Residual energy ; Wireless networks</subject><ispartof>Wireless networks, 2019-08, Vol.25 (6), p.3587-3603</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Wireless Networks is a copyright of Springer, (2019). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</citedby><cites>FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2194434587/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2194434587?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Zhang, De-gan</creatorcontrib><creatorcontrib>Gao, Jin-xin</creatorcontrib><creatorcontrib>Liu, Xiao-huan</creatorcontrib><creatorcontrib>Zhang, Ting</creatorcontrib><creatorcontrib>Zhao, De-xin</creatorcontrib><title>Novel approach of distributed &amp; adaptive trust metrics for MANET</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed &amp; adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</description><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data transmission</subject><subject>Electrical Engineering</subject><subject>Energy</subject><subject>Engineering</subject><subject>Experiments</subject><subject>Fuzzy sets</subject><subject>IT in Business</subject><subject>Mathematical analysis</subject><subject>Methods</subject><subject>Mobile ad hoc networks</subject><subject>Network reliability</subject><subject>Networks</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Recommender systems</subject><subject>Residual energy</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kE1LAzEQhoMoWD_-gKeA4C2ar91NbpZSP6DWSz2H7GaiW9rummQL_ntTV_DmYZiBed93hgehK0ZvGaXVXWSMVyWhTB-qKAg_QhNWVJwopsvjPFPOCaVCnaKzGNeUUiW0nqD7ZbeHDbZ9HzrbfODOY9fGFNp6SODwDbbO9qndA05hiAlvIe-aiH0X8Mt0OV9doBNvNxEuf_s5enuYr2ZPZPH6-DybLkgjmE5EUV9bW7jSSgWVc9IJYB5cpUA2rnYgavDgmROOZ0ldy6YsS-u0LYXy2olzdD3m5kc_B4jJrLsh7PJJw5mWUshCVVnFR1UTuhgDeNOHdmvDl2HUHEiZkZTJlMwPKcOzSYymmMW7dwh_0f-4vgGye2yS</recordid><startdate>20190801</startdate><enddate>20190801</enddate><creator>Zhang, De-gan</creator><creator>Gao, Jin-xin</creator><creator>Liu, Xiao-huan</creator><creator>Zhang, Ting</creator><creator>Zhao, De-xin</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20190801</creationdate><title>Novel approach of distributed &amp; adaptive trust metrics for MANET</title><author>Zhang, De-gan ; Gao, Jin-xin ; Liu, Xiao-huan ; Zhang, Ting ; Zhao, De-xin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data transmission</topic><topic>Electrical Engineering</topic><topic>Energy</topic><topic>Engineering</topic><topic>Experiments</topic><topic>Fuzzy sets</topic><topic>IT in Business</topic><topic>Mathematical analysis</topic><topic>Methods</topic><topic>Mobile ad hoc networks</topic><topic>Network reliability</topic><topic>Networks</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Recommender systems</topic><topic>Residual energy</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, De-gan</creatorcontrib><creatorcontrib>Gao, Jin-xin</creatorcontrib><creatorcontrib>Liu, Xiao-huan</creatorcontrib><creatorcontrib>Zhang, Ting</creatorcontrib><creatorcontrib>Zhao, De-xin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI商业信息数据库</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Science Database (ProQuest)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, De-gan</au><au>Gao, Jin-xin</au><au>Liu, Xiao-huan</au><au>Zhang, Ting</au><au>Zhao, De-xin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Novel approach of distributed &amp; adaptive trust metrics for MANET</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2019-08-01</date><risdate>2019</risdate><volume>25</volume><issue>6</issue><spage>3587</spage><epage>3603</epage><pages>3587-3603</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed &amp; adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-019-01955-2</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2019-08, Vol.25 (6), p.3587-3603
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_2194434587
source ABI/INFORM Global (ProQuest); Springer Nature
subjects Communication
Communications Engineering
Computer Communication Networks
Data transmission
Electrical Engineering
Energy
Engineering
Experiments
Fuzzy sets
IT in Business
Mathematical analysis
Methods
Mobile ad hoc networks
Network reliability
Networks
Nodes
Packets (communication)
Recommender systems
Residual energy
Wireless networks
title Novel approach of distributed & adaptive trust metrics for MANET
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T14%3A11%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Novel%20approach%20of%20distributed%20&%20adaptive%20trust%20metrics%20for%20MANET&rft.jtitle=Wireless%20networks&rft.au=Zhang,%20De-gan&rft.date=2019-08-01&rft.volume=25&rft.issue=6&rft.spage=3587&rft.epage=3603&rft.pages=3587-3603&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-019-01955-2&rft_dat=%3Cproquest_cross%3E2194434587%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-80fbaa5d6a48e7dd4d3e1fed78e4cdbde3befef1d3d2a48bb4c666ad9a638f9d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2194434587&rft_id=info:pmid/&rfr_iscdi=true