A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
Ad-hoc networking refers to the spontaneous formation of a network of nodes without the help of any infrastructure, usually through wireless communication channels. In ad-hoc networks, a basic routing infrastructure emerges through the collaboration of every node with its neighbors to forward packets towards chosen destinations. It is critical to detect and isolate the misbehaving nodes in order to avoid being misled by the falsified information injected by such compromised nodes. We propose an opinion based cooperative trust model to improve the performance of network, particularly in the presence of malicious nodes. In the proposed model, each node determines the trustworthiness of the other nodes with respect to behavior observed. It calculated the direct trust by the information obtained independently of other nodes and indirect trust information obtained via opinion of other nodes. Our trust model exploits information sharing among nodes to accelerate the convergence of trust establishment procedures, yet is robust against the propagation of false trust information by malicious nodes. We present simulation results which demonstrate the effectiveness of the proposed trust model scheme in a variety of scenarios involving nodes that are malicious with respect to both packet forwarding and trust propagation.