Selection of Trusted Nodes in MANET by using Analytic Network Process

Authors

  • V Jayalakshmi Department of Computer Applications, Sudharsan Engineering College, Tamilnadu, India
  • T Abdul Razak Department of Computer Science, Jamal Mohamed College, Tamilnadu, India

Keywords:

Trust, routing, analytic network process, MANET, security

Abstract

MANET is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. The performance of ad hoc networks depends on the cooperative and trust nature of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without centralized authorities. In this paper, a novel dynamic trust quantization model with multiple decision factors based on Analytic Network Process (ANP) decision theory is proposed. The multiple decision factors include direct trust, recommendation based trust, active degree, similarity degree and packet forwarding ratio. These multiple trust factors are incorporated to reflect trust relationship's complexity and uncertainty. Based on the trust factors, the selection of the trusted nodes is obtained by using Analytic Network Process. An information theoretic framework which uses ANP is presented in this paper. ANP is used for making trust decisions which replaces the Analytic Hierarchy Process (AHP) already used in the literature. The AHP reduces a multidimensional problem into a one dimensional one. Decisions are determined by a single number for the best outcome or by a vector of priorities that gives an ordering of the different possible outcomes. The selected nodes obtained by using the ANP decision theorem eliminate the malicious nodes and helps to protect the network from any internal attacks Trust

References

Kannhavong, Bounpadith, et al. "A survey of routing attacks in mobile ad hoc networks."Wireless communications, IEEE 14.5 (2007): 85-91.

Y-C Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Sec. and Privacy, May–June 2004.

K. Sanzgiri et al., “A Secure Routing Protocol for Ad Hoc Networks,” Proc. 2002 IEEE Int‟l. Conf. Network Protocols, Nov. 2002

Li, Xiaoqi, Michael R. Lyu, and Jiangchuan Liu. "A trust model based routing protocol for secure ad hoc networks." Aerospace Conference, 2004. Proceedings. 2004 IEEE. Vol. 2. IEEE, 2004.

Ghosh, Tirthankar, Niki Pissinou, and Kami Makki. "Towards designing a trusted routing solution in mobile ad hoc networks." Mobile

Networks and Applications 10.6 (2005): 985-995.

Pirzada, Asad Amir, and Chris McDonald. "Trust establishment in pure ad-hoc networks." Wireless Personal Communications 37.1-2 (2006): 139-168.

Xiao-Lin, LI Xiao-Yong GUI. "Trust Quantitative Model with Multiple Decision Factors in Trusted Network [J]." Chinese Journal of Computers 3 (2009): 004.

Xia, Hui, et al. "A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules."

Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications. IEEE Computer Society, 2011.

Saaty, Thomas L. "Analytic network process."Encyclopedia of Operations Research and Management Science. Springer US, 2001 8-35.

G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the 3rd ACM workshop on Wireless security, 2004, pp. 1–10.

Beth,T., Borcherding, M., Klein, B.: „Valuation of trust in open network‟.Proc.ESORICS, 1994, pp.3–15

Josang,A.:„A logic for uncertain probabilities‟ ,Int.J.Uncertainty, Fuzziness, Knowledge-Based Syst., 2001, 9,(3),pp 179–311 13

Mui, L.: „Computational models of trust and reputation: agents,evolutionary games, and social networks‟. PhDthesis, Massachusetts, 2003

Sun,Y.L.,Yu,W.,Han,Z.,Ray,L.K.J.:„Information theoretic framework of trust modeling and evaluation for ad hoc networks‟, IEEE J. Sel.Areas Commun., 2006, 24, (2), pp.305–319

Sun,Y.L.,Yu,W.,Han,Z.,Ray,L.K.J.:„Trust modeling and evaluation in Adhoc networks ‟.Proc. Global Telecommunications, 2005,pp.1–10

Xia, Hui, et al. "Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory." Wireless

Sensor Systems, IET1.4 (2011): 248-266

Satty, T.L.: „The analytic hierarchy process‟ (McGraw-Hill, New York, 1980)

Dai, Hongjun, Zhiping Jia, and Zhiwei Qin. "Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs." Journal of Software (1796217X) 4.10 (2009).

S. Kamvar, M.Schlosser, and H. Garcia-Molina, “The EigenTrust Algorithmfor Reputation Management in P2PNetworks,” in Proceedings of theTwelfthInternational WorldWideWebConference, Budapest, May2003.

Ziegler, C.N. and Lausen, G. “Analyzing Correlation Between Trust and User Similarity in Online Communities”. Proc. of the 2 nd

International Conference on Trust Management, 2004

Breese, J. S., Heckerman, D. and Kadie, C. “Empirical analysis of predictive algorithms for collaborative filtering”. Proc. of the 14 th

Conference on Uncertainty in Artificial Intelligence, 1998.

Herlocker, J. L., Konstan, J. A., Borchers, A., and Riedl, J. “An Algorithmic Framework for Performing Collaborative Filtering”. Proc. of the 22nd ACM SIGIR Conference on Research and Development in Information Retrieval, 1999

Pearson K. “Mathematical contribution to the theory of evolution: VII, on the correlation of characters not quantitatively measurable”. Phil. Trans. R. Soc. Lond. A, 195, 1-47, 1900.

Downloads

Published

2024-02-26

How to Cite

V, J., & T, A. R. (2024). Selection of Trusted Nodes in MANET by using Analytic Network Process. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(03), 657–662. Retrieved from https://ijact.in/index.php/j/article/view/117

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.