Advertisement

Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network

  • Muhammad Sohail
  • Liangmin Wang
  • Bushra Yamin
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 747)

Abstract

Ad hoc networks due to its open and dynamic nature are susceptible to a variety of security threats. Recently trust management emerged as the promising candidate to provide less computational and secure solutions. This paper based on novel idea i.e. trust mechanism based AODV (Ad hoc On-demand Distance Vector) routing protocol in the network layer of MANET to enhance network security. In our proposed scheme trust among nodes is represented by opinions, which is an item derived from three Valued subjective logic (3VSL). The opinions are dynamic, therefore judged, combined and updated frequently. In 3VSL the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Meanwhile, using advised and personal trust, a node can make relative judgment for forward node authenticity. The simulated results validate the accuracy of our proposed scheme.

Keywords

AODV Trust management Three valued subjective logic MANET 

References

  1. 1.
    Jiang, S., Zhu, X., Wang, L.: An efcient anonymous batch authentication scheme based on HMAC for vanets. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRefGoogle Scholar
  2. 2.
    Movahedi, Z., Hosseini, Z., Bayan, F., Pujolle, G.: Trust-distortion resistant trust management frameworks on mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 18(2), 1287–1309 (2016)CrossRefGoogle Scholar
  3. 3.
    Cook, K.S.: Trust in Society. Russell Sage Foundation Series on Trust, vol. 2, February 2003Google Scholar
  4. 4.
    Josang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 09(03), 279–311 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Liu, G., Yang, Q., Wang, H., Lin, X., Wittie, M.P.: Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 1698–1706 (2014)Google Scholar
  6. 6.
    Liu, G., Chen, Q., Yang, Q., Wang, H., Zhu, B., Wang, W.: Opinionwalk: an efficient solution to massive trust assessment in online social networks. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)Google Scholar
  7. 7.
    Awasthi, S.K., Singh, Y.N.: Generalized analysis of convergence of absolute trust in peer-to-peer networks. IEEE Commun. Lett. 20(7), 1345–1348 (2016)Google Scholar
  8. 8.
    Nguyen, D.Q., Toulgoat, M., Lamont, L.: Impact of trust-based security association and mobility on the delay metric in MANET. J. Commun. Networks 18(1), 105–111 (2016)CrossRefGoogle Scholar
  9. 9.
    Liu, G., Yang, Q., Wang, H., Wu, S., Wittie, M.P.: Uncovering the mystery of trust in an online social network. In: 2015 IEEE Conference on Communications and Network Security (CNS), Florence, pp. 488–496 (2015)Google Scholar
  10. 10.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 99, pp. 90-100 (1999)Google Scholar
  11. 11.
    Xia, H., Jia, Z., Li, X., Ju, L., Sha, H.M.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)CrossRefGoogle Scholar
  12. 12.
    Jsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, pp. 2502–2511 (2002)Google Scholar
  13. 13.
    Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manage. 8(2), 79–91 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Computer Science and Communicatoin EngineeringJiangsu UniversityZhenjiangPeople’s Republic of China
  2. 2.School of Library and Archive managementJiangsu UniversityZhenjiangPeople’s Republic of China

Personalised recommendations