Trusted routing protocol under consideration with communication
reliability and path length in mobile Ad-hoc network

 Liang Guang -Min1 ,Wang Jian2

Journal of Nanjing University(Natural Sciences) ›› 2012, Vol. 48 ›› Issue (2) : 206-213.

PDF(593533 KB)
PDF(593533 KB)
Journal of Nanjing University(Natural Sciences) ›› 2012, Vol. 48 ›› Issue (2) : 206-213.

 Trusted routing protocol under consideration with communication
reliability and path length in mobile Ad-hoc network

  •  Liang Guang -Min1 ,Wang Jian2
Author information +
History +

Abstract

 Different from most of past routing algorithms which only considered shortest path first or evaluated the trust level solely on the forwarding behavior or were dependent on reputation recommendation mechanism,we proposed a novel subjective trusted routing model under consideration to both communication reliability and path length, Inspired by the establishment pattern of trust relationships in human life,we introduce the concept of attribute similarity to inherently bind neighbor selection, trust evaluation, packet forwarding, and other routing processes. Simulations show that the proposed trust routing model behaves better than dynamic source routing protocol on defending against malicious nodes. Also we provided some numerical results about the impacts of different communication ranges, moving speeds and node numbers on performance.

Cite this article

Download Citations
 Liang Guang -Min1 ,Wang Jian2
.
 Trusted routing protocol under consideration with communication
reliability and path length in mobile Ad-hoc network
[J]. Journal of Nanjing University(Natural Sciences), 2012, 48(2): 206-213

References

[1]Mui L, Mohtashcmi M. Halhcrstadt A. A computational model of trust and rcputation. Proceedings of the 35th Hawaii International
Conference on System Sciences, Big Island,Ha- waii,USA,2002,188一196.
[2]Raya M, Hubaux J P. Securing vehicular Ad hoc networks. Journal of Computer Security, 2007,15(1):39一68.
[3]Adibi S, Agnew G B. Multilayer flavored dy- namic source routing in mobile ad-hoc net- works. The institution of Engineering and
Technology Communications, 2008,2(5):690一707.
[4]Johnson D, Maltz D. Dynamic source routing in Ad-hoc wireless networks, Imiclinski T,Korth H. Mobile Computing. Norwcll:Kluwcr Aca-
demic Publishers, 1996,153一181.
[5]Perkins C, Belding E, Das S. Ad-hoc on-de mand distance vector (AODV) routing, Internet Engineering Task Force Request for Comments,2003,561.
[6]Zhang Q, Hu G M,Chen H T,et al. Cluste- ring algorithm and analysis based on objective trust modeling in MANET. Journal on Commu-
nications, 2009, 35(2); 12~21.(张强,胡光明,陈海涛等.MANET基于客观信任度建模的分簇算法与分析.通信学报,2009, 35(2); 12一21.)
[7]Peng S C,Jia W J,Wang G J,et al.Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks.The institute of Elec-
tronics, Information and Communication Engi- neers Transactions on information and Systems,2010,E93一D(3):510一517.
[8]Pirzada A A,McDonald C. Establishing trust in pure ad-hoc networks. Proceedings of A us tralasian Conference on Computer Science,2004,56:47~54
[9]A nantvalce T,Wu J. Reputation-based system for encouraging the cooperation of nodes in mo- bile Ad-hoc networks. Proceedings of IEEE In-
ternational Conference on the Communications,2007,3383一3388.
[10]Peng S C, Jia W J,Wang G J. Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks. Proceed-
ings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008, 2:3一9.
[11]Luo J,Liu X, Zhang Y,et al. Fuzzy trust rec ommendation based on collaborative filtering for mobile ad-hoc networks. Proceedings of IEEE
Conference on Local Computer Networks,2008,305一311.
[12]Li J,Li R,Kato J. Future trust management framework for mobile Ad-hoc networks, IEEE Communications Magazine,2008,46(4): 108一114.
[13]Marti S, Giuli T J,Lai K,et al. Mitigating routing misbehavior in mobile Ad-hoc net- works. Proceedings of nternational Conference
on Mobile Computing and Networking, 2000,255一265.
[14]Buchegger S, Boudec Le J Y. Performance anal- ysis of the CONF7DANT protocol:Cooperation of nodes-fairness in dynamic ad-hoc networks.
Proceedings of ACM international Symposium on Mobile Ad-hoc Networking and Computing, 2002,226一236.
[15]Yang H B, Zhang N R. The comparative study of secure routing protocols for mobile Ad Hoc networks. Journal of Nanjing University(Natu-
ralScicnces), 2005, 41(5): 340~346.(杨华兵,张宁蓉.移动Ad Hoc网络安全路由协议的比较研究.南京大学学报(自然科学),2005, 41 (5):340一346).
[16]Winjum E Spilling P,Kure ¢.Trust metric routing to regulate routing cooperation in mobile wireless Ad-hoc networks. Proceedings of Eu
ropcan Wireless,2005,399一406.




PDF(593533 KB)

1265

Accesses

0

Citation

Detail

Sections
Recommended

/