Towards reliable self-clustering Mobile Ad Hoc Networks

https://doi.org/10.1016/j.compeleceng.2011.11.018Get rights and content

Abstract

With the introduction of Mobile Ad Hoc Networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. In this paper, we present a novel approach to improve the search efficiency and scalability of MANETs by clustering nodes based on trust mechanism. In our method, the trust relationship is formed by evaluating the level of trust using Bayesian statistic analysis, and clusters can be formed and maintained autonomously by nodes with only partial knowledge. Simulation results show that each node can form and join proper clusters based on their trust degree, and the cluster-based search algorithm with trust mechanism outperforms over those in current popular clustering models.

Highlights

► This paper proposed a novel approach to improve the search efficiency and scalability of MANETs. ► A comprehensive Bayesian trust model is proposed to evaluate the trust degree of nodes. ► Experiments and case studies are carried out to evaluate our proposed method.

Introduction

A Mobile Ad Hoc Network (MANET) is a self-configuring network in which nodes rely on other nodes for communications. Security poses some fundamental challenges in such networks as they are not conducive to centralized trusted authorities. Although several secure routing protocols [1], [2] have been proposed to defend against predefined attacks, they are vulnerable to new and dynamically changing attacks. This has led to the development of several trust models [3], [4], [5], [6], [7], [8], in which mobile nodes capture evidence of trustworthiness of other nodes to quantify and represent their behavior, and then to establish trust relationships with them.

However, there are two crucial issues of current trust models, one is the inefficient query routing, which makes these models not highly scalable. For example, in reference [3], queries will be flooded throughout the whole network and the search traffic increases dramatically with the network size. The other is how to select appropriate nodes to cooperate with, since the candidate nodes are autonomous and may be unreliable or dishonest. This raises the question of how much credence to give each resource, and we cannot expect each user to know the trustworthiness of each resource. Without a good solution to this problem, MANET systems are not likely to be deployed for serous applications. Essentially, nodes need to manage the risk of communicating or cooperating with each other without prior experience and knowledge about each other.

In this paper, we present on how our novel Bayesian method based trust model facilitates mobile nodes to explicitly represent and manage behavior evidence in their trust relationships with other nodes. In addition, we propose a trust-based self-clustering algorithm to improve search performance and scalability of MANETs with trust assurance. Query messages are limited within nodes’ own or nearby clusters, which can make a query hit quickly with low search overhead. This paper is based on our previous work [4], and larger expansion is carried out in this paper with the main contributions listed below:

  • A comprehensive Bayesian trust model is proposed to evaluate the trust degree of nodes;

  • A novel approach to improve the search efficiency and scalability of MANETs by clustering nodes based on trust mechanism is proposed;

  • Simulation results show that each node can form and join proper clusters based on their trust degree and the cluster-based search with trust assurance performance outperforms those in current popular trust models.

The rest of this paper is organized as follows. We review some related work in Section 2. In Section 3, we introduce the proposed clustering algorithm. The evaluation of our approach by simulations is given in Section 4 and finally we conclude this paper in Section 5.

Section snippets

Related work

For the purpose of this paper, we focus our discussion on the few well-known and recently proposed trust models [3], [4], [5], [6], [7]. Liu et al. proposed a trust model [5] in which evidence of trustworthiness is collected by monitoring the behaviour of neighbors and recommendations received from them. Pirzada et al. [6] proposed a similar approach for establishing trusted routes in Dynamic Source Routing (DSR) protocol [8]. They differ from the above approach by assigning trust weights to

Basic ideas

In this paper, we address only the reactive routing protocols because of their ability to discover routes on demand. Amongst the reactive protocols, we have chosen the Ad-hoc On-demand Distance Vector protocol [11] to present the details of our trust model.

Finding trust information from a heterogeneous set of information resources is a longstanding problem in computing. In everyday life we observe that there are successful strategies for finding trusted information in a social network of

Simulation results and discussions

In this section, we evaluate the proposed clustering algorithms by simulations.

Conclusion

We proposed a new self-clustering algorithm to improve the search performance and scalability of MANETs with trust assurance. By the proposed algorithm, each node is capable to form clusters by only local knowledge, which makes our algorithm suitable for distributed autonomous MANETs. Here clusters refer to node groups where nodes are connected tightly based on trust relationship and share the same context of trust. Meanwhile, the trust-based light weighted maximum flow theorem is utilized to

Acknowledgments

This work was supported by the National High-Tech Research & Development Program of China (Grant Nos. 2009AA012201), the National Natural Science Foundation of China (Grant Nos. 61103068, 61174158, 61102059), the joint of NSFC and Microsoft Asia Research (Grant No. 60970155), the Ph.D. Programs Foundation of Ministry of Education (Grant No. 20090072110035), the Program of Shanghai Subject Chief Scientist (Grant No. 10XD1404400) the State Key Laboratory of High-end Server & Storage Technology

Wei Wang was born in 1979 and received his Ph.D. in computer software and theory from the Department of Computer Science and Technology, Tongji University. Nowadays, he is working in Tongji University as a faculty of the Department of Computer Science and Technology. His research interests include mobile computing, cloud computing, and information security. He got R. L. Zhang Scholarship and HP Chinese Best Student Scholarship in 2006. In 2007, he was granted IBM Ph.D. Fellowship. He has

References (18)

  • Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for Ad hoc networks. In: International...
  • Papadimitratos P, Haas ZJ. Secure routing for mobile Ad hoc networks. In: SCS Communication Networks and Distributed...
  • Bansal S, Baker M. Observation-based cooperation enforcement in Ad hoc networks. Technical Report. Stanford University;...
  • W. Wang et al.

    Trusted dynamic level scheduling based on bayesian trust model, science in china: series F information

    Sciences

    (2007)
  • Liu Z, Joy AW, Thompson RA. A dynamic trust model for mobile Ad hoc networks. In: 10th IEEE international workshop on...
  • Pirzada AA, Datta A, McDonald C. Propagating trust in Ad-hoc networks for reliable routing. In: IEEE international...
  • Jiang T, Baras JS, Ant-based adaptive trust evidence distribution in MANET. In: 24th international conference on...
  • Johnson DB, Maltz DA, Broch J. DSR: The dynamic source routing protocol for multihop wireless Ad hoc networks. In:...
  • Kermarrec A, Self-clustering in node-to-node overlays. In: International workshop on self∗ properties in complex...
There are more references available in the full text version of this article.

Cited by (12)

  • Modified DSR protocol for detection and removal of selective black hole attack in MANET

    2014, Computers and Electrical Engineering
    Citation Excerpt :

    Whereas our approach does not employ any promiscuous monitoring by upstream nodes in the source route and the nodes in forwarding path observe other nodes behavior by means of QREQ and QREP packets. In [23], trust based approach is proposed to improve the search performance and scalability of MANETs. Here the cluster refers to node groups where nodes are connected tightly based on trust relationship and share the same context of trust.

  • Detection and isolation of black hole attack in mobile ad hoc networks: A review

    2020, Proceedings of SPIE - The International Society for Optical Engineering
  • PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks

    2018, Journal of Information Science and Engineering
View all citing articles on Scopus

Wei Wang was born in 1979 and received his Ph.D. in computer software and theory from the Department of Computer Science and Technology, Tongji University. Nowadays, he is working in Tongji University as a faculty of the Department of Computer Science and Technology. His research interests include mobile computing, cloud computing, and information security. He got R. L. Zhang Scholarship and HP Chinese Best Student Scholarship in 2006. In 2007, he was granted IBM Ph.D. Fellowship. He has published more than 30 papers published in national or international key journals.

Guosun Zeng was born in 1964 and received his B.S., M.S., and Ph.D. in computer software and application all from the Department of Computer Science and Engineering, Shanghai Jiao Tong University. Nowadays, he is working in Tongji University as the vice dean of the department of the computer science and technology, and a supervisor of Ph.D. candidates in computer software and theory. He has more than 90 papers published in national or international key journals such as Science in China, Chinese Journal of Computers, and Journal of Software.

Jing Yao received the Ph.D. degree in Control Theory and Control Engineering from Huazhong University of Science and Technology, Wuhan, China, in 2007. She is currently an Associate Professor in the Department of Control Science and Engineering at Tongji University, Shanghai, China. Dr. Yao was a Research Assistant in the Department of Electronic Engineering at City University of Hong Kong, Hong Kong SAR, China, from June 2004 to January 2005. She has held a visiting position in the Department of Mechanical Engineering at Boston University, Boston, MA, USA, from February 2006 to February 2007.

Hanli Wang received the B.S. and M.S. degrees in electrical engineering from Zhejiang University, Hangzhou, China, in 2001 and 2004, respectively, and the Ph.D. degree in computer science from City University of Hong Kong, Kowloon, Hong Kong, in 2007. In 2010, he joined the Department of Computer Science and Technology, Tongji University, Shanghai, China, as a Professor. His current research interests include digital video coding, image processing, pattern recognition, and video content analysis.

Zongtang Dai received the Ph.D. degree from Tongji University. He is a lecturer at the department of construction management and real estate in Tongji University. His research interests include Urban Management, Real Estate Investment and wireless network based smart home.

Reviews processed and proposed for publication to Editor-in-Chief by Associate Editor Dr. Glaucio H.S. Carvalho.

View full text