Towards reliable self-clustering Mobile Ad Hoc Networks☆
Highlights
► This paper proposed a novel approach to improve the search efficiency and scalability of MANETs. ► A comprehensive Bayesian trust model is proposed to evaluate the trust degree of nodes. ► Experiments and case studies are carried out to evaluate our proposed method.
Introduction
A Mobile Ad Hoc Network (MANET) is a self-configuring network in which nodes rely on other nodes for communications. Security poses some fundamental challenges in such networks as they are not conducive to centralized trusted authorities. Although several secure routing protocols [1], [2] have been proposed to defend against predefined attacks, they are vulnerable to new and dynamically changing attacks. This has led to the development of several trust models [3], [4], [5], [6], [7], [8], in which mobile nodes capture evidence of trustworthiness of other nodes to quantify and represent their behavior, and then to establish trust relationships with them.
However, there are two crucial issues of current trust models, one is the inefficient query routing, which makes these models not highly scalable. For example, in reference [3], queries will be flooded throughout the whole network and the search traffic increases dramatically with the network size. The other is how to select appropriate nodes to cooperate with, since the candidate nodes are autonomous and may be unreliable or dishonest. This raises the question of how much credence to give each resource, and we cannot expect each user to know the trustworthiness of each resource. Without a good solution to this problem, MANET systems are not likely to be deployed for serous applications. Essentially, nodes need to manage the risk of communicating or cooperating with each other without prior experience and knowledge about each other.
In this paper, we present on how our novel Bayesian method based trust model facilitates mobile nodes to explicitly represent and manage behavior evidence in their trust relationships with other nodes. In addition, we propose a trust-based self-clustering algorithm to improve search performance and scalability of MANETs with trust assurance. Query messages are limited within nodes’ own or nearby clusters, which can make a query hit quickly with low search overhead. This paper is based on our previous work [4], and larger expansion is carried out in this paper with the main contributions listed below:
- –
A comprehensive Bayesian trust model is proposed to evaluate the trust degree of nodes;
- –
A novel approach to improve the search efficiency and scalability of MANETs by clustering nodes based on trust mechanism is proposed;
- –
Simulation results show that each node can form and join proper clusters based on their trust degree and the cluster-based search with trust assurance performance outperforms those in current popular trust models.
The rest of this paper is organized as follows. We review some related work in Section 2. In Section 3, we introduce the proposed clustering algorithm. The evaluation of our approach by simulations is given in Section 4 and finally we conclude this paper in Section 5.
Section snippets
Related work
For the purpose of this paper, we focus our discussion on the few well-known and recently proposed trust models [3], [4], [5], [6], [7]. Liu et al. proposed a trust model [5] in which evidence of trustworthiness is collected by monitoring the behaviour of neighbors and recommendations received from them. Pirzada et al. [6] proposed a similar approach for establishing trusted routes in Dynamic Source Routing (DSR) protocol [8]. They differ from the above approach by assigning trust weights to
Basic ideas
In this paper, we address only the reactive routing protocols because of their ability to discover routes on demand. Amongst the reactive protocols, we have chosen the Ad-hoc On-demand Distance Vector protocol [11] to present the details of our trust model.
Finding trust information from a heterogeneous set of information resources is a longstanding problem in computing. In everyday life we observe that there are successful strategies for finding trusted information in a social network of
Simulation results and discussions
In this section, we evaluate the proposed clustering algorithms by simulations.
Conclusion
We proposed a new self-clustering algorithm to improve the search performance and scalability of MANETs with trust assurance. By the proposed algorithm, each node is capable to form clusters by only local knowledge, which makes our algorithm suitable for distributed autonomous MANETs. Here clusters refer to node groups where nodes are connected tightly based on trust relationship and share the same context of trust. Meanwhile, the trust-based light weighted maximum flow theorem is utilized to
Acknowledgments
This work was supported by the National High-Tech Research & Development Program of China (Grant Nos. 2009AA012201), the National Natural Science Foundation of China (Grant Nos. 61103068, 61174158, 61102059), the joint of NSFC and Microsoft Asia Research (Grant No. 60970155), the Ph.D. Programs Foundation of Ministry of Education (Grant No. 20090072110035), the Program of Shanghai Subject Chief Scientist (Grant No. 10XD1404400) the State Key Laboratory of High-end Server & Storage Technology
Wei Wang was born in 1979 and received his Ph.D. in computer software and theory from the Department of Computer Science and Technology, Tongji University. Nowadays, he is working in Tongji University as a faculty of the Department of Computer Science and Technology. His research interests include mobile computing, cloud computing, and information security. He got R. L. Zhang Scholarship and HP Chinese Best Student Scholarship in 2006. In 2007, he was granted IBM Ph.D. Fellowship. He has
References (18)
- Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for Ad hoc networks. In: International...
- Papadimitratos P, Haas ZJ. Secure routing for mobile Ad hoc networks. In: SCS Communication Networks and Distributed...
- Bansal S, Baker M. Observation-based cooperation enforcement in Ad hoc networks. Technical Report. Stanford University;...
- et al.
Trusted dynamic level scheduling based on bayesian trust model, science in china: series F information
Sciences
(2007) - Liu Z, Joy AW, Thompson RA. A dynamic trust model for mobile Ad hoc networks. In: 10th IEEE international workshop on...
- Pirzada AA, Datta A, McDonald C. Propagating trust in Ad-hoc networks for reliable routing. In: IEEE international...
- Jiang T, Baras JS, Ant-based adaptive trust evidence distribution in MANET. In: 24th international conference on...
- Johnson DB, Maltz DA, Broch J. DSR: The dynamic source routing protocol for multihop wireless Ad hoc networks. In:...
- Kermarrec A, Self-clustering in node-to-node overlays. In: International workshop on self∗ properties in complex...
Cited by (12)
Efficient packet transmission and energy optimization in military operation scenarios of MANET
2015, Procedia Computer ScienceModified DSR protocol for detection and removal of selective black hole attack in MANET
2014, Computers and Electrical EngineeringCitation Excerpt :Whereas our approach does not employ any promiscuous monitoring by upstream nodes in the source route and the nodes in forwarding path observe other nodes behavior by means of QREQ and QREP packets. In [23], trust based approach is proposed to improve the search performance and scalability of MANETs. Here the cluster refers to node groups where nodes are connected tightly based on trust relationship and share the same context of trust.
Detection and isolation of black hole attack in mobile ad hoc networks: A review
2020, Proceedings of SPIE - The International Society for Optical EngineeringSRDPV: secure route discovery and privacy-preserving verification in MANETs
2019, Wireless NetworksPVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
2018, Journal of Information Science and Engineering
Wei Wang was born in 1979 and received his Ph.D. in computer software and theory from the Department of Computer Science and Technology, Tongji University. Nowadays, he is working in Tongji University as a faculty of the Department of Computer Science and Technology. His research interests include mobile computing, cloud computing, and information security. He got R. L. Zhang Scholarship and HP Chinese Best Student Scholarship in 2006. In 2007, he was granted IBM Ph.D. Fellowship. He has published more than 30 papers published in national or international key journals.
Guosun Zeng was born in 1964 and received his B.S., M.S., and Ph.D. in computer software and application all from the Department of Computer Science and Engineering, Shanghai Jiao Tong University. Nowadays, he is working in Tongji University as the vice dean of the department of the computer science and technology, and a supervisor of Ph.D. candidates in computer software and theory. He has more than 90 papers published in national or international key journals such as Science in China, Chinese Journal of Computers, and Journal of Software.
Jing Yao received the Ph.D. degree in Control Theory and Control Engineering from Huazhong University of Science and Technology, Wuhan, China, in 2007. She is currently an Associate Professor in the Department of Control Science and Engineering at Tongji University, Shanghai, China. Dr. Yao was a Research Assistant in the Department of Electronic Engineering at City University of Hong Kong, Hong Kong SAR, China, from June 2004 to January 2005. She has held a visiting position in the Department of Mechanical Engineering at Boston University, Boston, MA, USA, from February 2006 to February 2007.
Hanli Wang received the B.S. and M.S. degrees in electrical engineering from Zhejiang University, Hangzhou, China, in 2001 and 2004, respectively, and the Ph.D. degree in computer science from City University of Hong Kong, Kowloon, Hong Kong, in 2007. In 2010, he joined the Department of Computer Science and Technology, Tongji University, Shanghai, China, as a Professor. His current research interests include digital video coding, image processing, pattern recognition, and video content analysis.
Zongtang Dai received the Ph.D. degree from Tongji University. He is a lecturer at the department of construction management and real estate in Tongji University. His research interests include Urban Management, Real Estate Investment and wireless network based smart home.
- ☆
Reviews processed and proposed for publication to Editor-in-Chief by Associate Editor Dr. Glaucio H.S. Carvalho.