Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Scalability study of the ad hoc on-demand distance vector routing protocol
International Journal of Network Management
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
A Reputation-Based Trust Mechanism for Ad Hoc Networks
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Fuzzy Trust for Peer-to-Peer Systems
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
Building a fuzzy trust network in unsupervised multi-agent environments
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
A reputation management scheme based on global trust model for peer-to-peer virtual communities
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A fuzzy trust evaluation method for knowledge sharing in virtual enterprises
Computers and Industrial Engineering
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Trusted information exchange in peer-to-peer mobile social networks
Concurrency and Computation: Practice & Experience
TIDS: trust-based intrusion detection system for wireless ad-hoc networks
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Computers and Industrial Engineering
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In a mobile ad-hoc network (MANET) environment, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because mobile nodes are usually constrained by limited energy, bandwidth and computational power, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. Selfish behavior of autonomous network nodes could greatly disrupt network operation and degrade the overall performance of a non-cooperative ad-hoc network. Nodes have to manage the risk involved with the transactions without prior knowledge about each other's reputation. Currently, some methods for trust establishment in MANETs have been proposed based on using cryptographic primitives to address cooperation among nodes attributes and handle selfish behaviors of nodes in MANETs environment. However, these solutions are not always suited to MANETs. The measurement and computation of trust to secure interactions between mobile nodes is crucial for the development of trust mechanisms. The calculation and measurement of trust in unsupervised ad-hoc environment involves complex aspects such as credibility rating for opinions delivered by a node, the honesty of recommendations provided by a mobile node, or the assessment of past experiences with the node one wishes to interact with. The deployment of suitable algorithms and models imitating fuzzy logic can help to solve these problems. In this paper, RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs. Fuzzy logic provides a natural framework to deal with uncertainty and the tolerance of imprecise data inputs for the subjective tasks of trust evaluation, packet forwarding review and credibility adjustment. Theoretical analysis and experimental results show that RFSTrust is still robust under more general conditions where selfish nodes cooperate in an attempt to deliberately subvert the system, end-to-end packet delivery ratio more quickly, and decreases the average energy consumes more effectively. The effect of node rating data's sparsity can be greatly reduced and show the excellent performance on typical data set.