Skip to main content

RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 293))

Included in the following conference series:

Abstract

Ad hoc networks are vulnerable to many types of attacks. Their success will undoubtedly depend on the trust they bring to their users. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. This paper expands on relevant fuzzy logic concepts to propose an approach to establish quantifiable trust levels between the nodes of Ad hoc networks. The proposed solution defines additional operators to fuzzy logic in order to find an end to end route which is free of malicious nodes with collaborative effort from the neighbors. In our scheme (RTIC) the path with more trusted decision value is selected as a secure route from source to destination. In order to prove the applicability of the proposed solution, we demonstrate the performance of our model through NS-2 simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosh, T., Pissinou, N., Makki, K.: Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications 10, 985–995 (2005)

    Article  Google Scholar 

  2. Luo, H., Lu, S.: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks. IEEE/ACM Transactions on Networking 1, 1049–1063 (2004)

    Article  Google Scholar 

  3. Velloso, P.B., Laufer, R.P., Duarte, O.C., Pujolle, G.: A Trust Model Robust to Slander Attacks in Ad Hoc Networks. In: 8th IFIP IEEE International Conference on Mobile and Wireless Communication Networks, MWCN 2006, Santiago (2006)

    Google Scholar 

  4. Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for security in mobile Ad hoc Networks. In: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC, Long Beach (2001)

    Google Scholar 

  5. Velloso, P.B., Laufer, R.P., Duarte, O.C., Pujolle, G.: Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity Based Model. IEEE Transactions on Network and Service Management 7(3) (2010)

    Google Scholar 

  6. Li, J., Li, R., Kato, J.: Future trust management framework for mobile Ad hoc networks. IEEE Communications Mag. 46(4), 108–114 (2008)

    Article  Google Scholar 

  7. Abdul-Rahman, Hailes, S.: A distributed trust model. In: Proceedings of 1997 New Security Paradigms Workshop, pp. 48–60. ACM Press (1998)

    Google Scholar 

  8. Zimmermann, P.: The Official PGP User’s Guide. MIT Press (1995)

    Google Scholar 

  9. Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organized public-key management for mobile Ad hoc networks. IEEE Transactions on Mobile Computing 2(1) (2003)

    Google Scholar 

  10. Buchegger, S., Le Boudec, J.V.: Self-Policing Mobile Ad hoc Networks by Reputation Systems. IEEE Communications, 101–107 (2005)

    Google Scholar 

  11. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless Ad hoc networks. IEEE Communications (2002)

    Google Scholar 

  12. Song, S., Hwang, K., Zhou, R., Kwong-Kwok, Y.: Trusted P2P Transactions with Fuzzy Reputation Aggregation, 1089-7801. IEEE Computer Society (2005)

    Google Scholar 

  13. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized Ad hoc networks. Technical Report, DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)

    Google Scholar 

  14. Gupta, P., Judge, P., Aniniar, M.H.: A reputation system for peer-to-peer networks. In: Papadopoulos, C., Almeroth, K.C. (eds.) NOSSDAV, pp. 144–152. ACM (2003)

    Google Scholar 

  15. Ismail, S., Josang, A.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce (2002)

    Google Scholar 

  16. Zacharia, G., Maes, P.: Trust management through reputation mechanisms. Applied Artificial Intelligence 14(9), 881–907 (2000)

    Article  Google Scholar 

  17. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen-trust algorithm for reputation management in p2p networks (2007)

    Google Scholar 

  18. Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: 6th IFIP Conf. Sec., Slovenia (2002)

    Google Scholar 

  19. Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  20. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile Ad hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking, Boston (2000)

    Google Scholar 

  21. Rishiwal, V., Kush, A., Verma, S.: Backbone nodes based Stable routing for mobile Ad hoc network. UBICC Journal 2(3), 34–39 (2007)

    Google Scholar 

  22. Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., Cardei, M.: Reputation and Trust-Based Systems for Ad hoc and Sensor Networks. In: Boukerche, A. (ed.) Algorithms and Protocols for Wireless Ad hoc and Sensor Networks. Wiley & Sons (2007)

    Google Scholar 

  23. AbdulRahman, A., Zuriati, A.Z.: Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks. European Journal of Scientific Research 31(4), 566–576 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beghriche, A., Bilami, A. (2012). RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30507-8_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30506-1

  • Online ISBN: 978-3-642-30507-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics