Skip to main content

Advertisement

Log in

A Trust-Distortion Resistant Trust Management Scheme on Mobile Ad Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Trust management is a promising approach to conduct nodes’ transactions and establish management interactions in mobile ad hoc networks, in which collaboration between nodes is critical to achieve system goals. Lack of centralized management, severe resource constraints (e.g. computing power, energy, bandwidth), and important network dynamics (e.g. topology changes, node mobility, node failure, propagation channel conditions) make the trust management a challenging task in such a network. Mainly, trust management frameworks are prone to attacks trying to deceive nodes’ estimation on other nodes’ trustworthiness, referred to as trust-distortion attacks. In order to inhibit such attacks, we propose a Trust-distortion Resistant Trust Management Scheme (TRTMS) which provides nodes with an accurate estimation on other nodes’ behavior and enables them to handle different trust-distortion attacks in a multi-attack environment. Simulation results prove that TRTMS significantly outperforms the existing alternatives in the literature in presence of simultaneous and contradictory different trust-distortion attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Velloso, P., Laufer, R., Cunha, D., Duarte, O., & Pujolle, G. (2010). Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management, 7(3), 172–185.

    Article  Google Scholar 

  2. Movahedi, Z., Hosseini, Z., Bayan, F., & Pujolle, G. (2016). Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey. IEEE Communications Surveys Tutorials, 18(2), 1287–1309. Secondquarter.

    Article  Google Scholar 

  3. Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014(3), 1–14.

    Google Scholar 

  4. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys Tutorials, 14(2), 279–298. quarter.

    Article  Google Scholar 

  5. Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.

    Article  Google Scholar 

  6. Wu, Y., Zhao, Y., Riguidel, M., Wang, G., & Yi, P. (2015). Security and trust management in opportunistic networks: A survey. Security and Communication Networks, 8(9), 1812–1827.

    Article  Google Scholar 

  7. Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28(14), 2003–2019.

    Article  Google Scholar 

  8. Li, J., Li, R., & Kato, J. (2008). Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 46(4), 108–114.

    Article  Google Scholar 

  9. Movahedi, Z., Nogueira, M., & Pujolle, G. (2012). An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks. In IEEE Wireless communications and networking conference (WCNC) (pp. 1898–1903) April 2012.

  10. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. Information Security, IET, 4(4), 212–232.

    Article  Google Scholar 

  11. Ullah, Z., Islam, M. H., & Khan, A. A. (2014). Detection of dishonest trust recommendations in mobile ad hoc networks. In 2014 international conference on computing, communication and networking technologies (ICCCNT) (pp. 1–7) July 2014.

  12. Chauhan, A., Gupta, D., & Sah, M. K. (2015). Detection of packet dropping nodes in manet using DSR routing protocol. International Journal of Computer Applications, 123(7), 10–16.

    Article  Google Scholar 

  13. Li, R., & Li, J. (2013). Requirements and design for neutral trust management framework in unstructured networks. The Journal of Supercomputing, 64(3), 702–716.

    Article  Google Scholar 

  14. Naseer, S., & Mahmood, R. (2015). Intrusion detection techniques in mobile adhoc networks: A review. Lecture Notes on Information Theory, 3(1), 52–55.

    Google Scholar 

  15. Iltaf, N., Ghafoor, A., & Zia, U. (2013). A mechanism for detecting dishonest recommendation in indirect trust computation. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–13.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeinab Movahedi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hosseini, Z., Movahedi, Z. A Trust-Distortion Resistant Trust Management Scheme on Mobile Ad Hoc Networks. Wireless Pers Commun 96, 5167–5183 (2017). https://doi.org/10.1007/s11277-016-3734-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3734-6

Keywords