Selection of Trusted Nodes in MANET by using Analytic Network Process
Keywords:
Trust, routing, analytic network process, MANET, securityAbstract
MANET is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. The performance of ad hoc networks depends on the cooperative and trust nature of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without centralized authorities. In this paper, a novel dynamic trust quantization model with multiple decision factors based on Analytic Network Process (ANP) decision theory is proposed. The multiple decision factors include direct trust, recommendation based trust, active degree, similarity degree and packet forwarding ratio. These multiple trust factors are incorporated to reflect trust relationship's complexity and uncertainty. Based on the trust factors, the selection of the trusted nodes is obtained by using Analytic Network Process. An information theoretic framework which uses ANP is presented in this paper. ANP is used for making trust decisions which replaces the Analytic Hierarchy Process (AHP) already used in the literature. The AHP reduces a multidimensional problem into a one dimensional one. Decisions are determined by a single number for the best outcome or by a vector of priorities that gives an ordering of the different possible outcomes. The selected nodes obtained by using the ANP decision theorem eliminate the malicious nodes and helps to protect the network from any internal attacks Trust
References
Kannhavong, Bounpadith, et al. "A survey of routing attacks in mobile ad hoc networks."Wireless communications, IEEE 14.5 (2007): 85-91.
Y-C Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Sec. and Privacy, May–June 2004.
K. Sanzgiri et al., “A Secure Routing Protocol for Ad Hoc Networks,” Proc. 2002 IEEE Int‟l. Conf. Network Protocols, Nov. 2002
Li, Xiaoqi, Michael R. Lyu, and Jiangchuan Liu. "A trust model based routing protocol for secure ad hoc networks." Aerospace Conference, 2004. Proceedings. 2004 IEEE. Vol. 2. IEEE, 2004.
Ghosh, Tirthankar, Niki Pissinou, and Kami Makki. "Towards designing a trusted routing solution in mobile ad hoc networks." Mobile
Networks and Applications 10.6 (2005): 985-995.
Pirzada, Asad Amir, and Chris McDonald. "Trust establishment in pure ad-hoc networks." Wireless Personal Communications 37.1-2 (2006): 139-168.
Xiao-Lin, LI Xiao-Yong GUI. "Trust Quantitative Model with Multiple Decision Factors in Trusted Network [J]." Chinese Journal of Computers 3 (2009): 004.
Xia, Hui, et al. "A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules."
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications. IEEE Computer Society, 2011.
Saaty, Thomas L. "Analytic network process."Encyclopedia of Operations Research and Management Science. Springer US, 2001 8-35.
G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the 3rd ACM workshop on Wireless security, 2004, pp. 1–10.
Beth,T., Borcherding, M., Klein, B.: „Valuation of trust in open network‟.Proc.ESORICS, 1994, pp.3–15
Josang,A.:„A logic for uncertain probabilities‟ ,Int.J.Uncertainty, Fuzziness, Knowledge-Based Syst., 2001, 9,(3),pp 179–311 13
Mui, L.: „Computational models of trust and reputation: agents,evolutionary games, and social networks‟. PhDthesis, Massachusetts, 2003
Sun,Y.L.,Yu,W.,Han,Z.,Ray,L.K.J.:„Information theoretic framework of trust modeling and evaluation for ad hoc networks‟, IEEE J. Sel.Areas Commun., 2006, 24, (2), pp.305–319
Sun,Y.L.,Yu,W.,Han,Z.,Ray,L.K.J.:„Trust modeling and evaluation in Adhoc networks ‟.Proc. Global Telecommunications, 2005,pp.1–10
Xia, Hui, et al. "Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory." Wireless
Sensor Systems, IET1.4 (2011): 248-266
Satty, T.L.: „The analytic hierarchy process‟ (McGraw-Hill, New York, 1980)
Dai, Hongjun, Zhiping Jia, and Zhiwei Qin. "Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs." Journal of Software (1796217X) 4.10 (2009).
S. Kamvar, M.Schlosser, and H. Garcia-Molina, “The EigenTrust Algorithmfor Reputation Management in P2PNetworks,” in Proceedings of theTwelfthInternational WorldWideWebConference, Budapest, May2003.
Ziegler, C.N. and Lausen, G. “Analyzing Correlation Between Trust and User Similarity in Online Communities”. Proc. of the 2 nd
International Conference on Trust Management, 2004
Breese, J. S., Heckerman, D. and Kadie, C. “Empirical analysis of predictive algorithms for collaborative filtering”. Proc. of the 14 th
Conference on Uncertainty in Artificial Intelligence, 1998.
Herlocker, J. L., Konstan, J. A., Borchers, A., and Riedl, J. “An Algorithmic Framework for Performing Collaborative Filtering”. Proc. of the 22nd ACM SIGIR Conference on Research and Development in Information Retrieval, 1999
Pearson K. “Mathematical contribution to the theory of evolution: VII, on the correlation of characters not quantitatively measurable”. Phil. Trans. R. Soc. Lond. A, 195, 1-47, 1900.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.