Skip to main content
Log in

LocTrust: A local and global consensus-combined trust model in MANETs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the increase of malicious peers, how to ensure the network availability has been an important research topic in recent years, especially for the mobile ad hoc network (MANET) due to its inherent nature of peers’ strong mobility and short wireless transmission range. Usually, the trust models are employed in MANETs for guaranteeing the transactions’ success, where the peers’ mobility is handled by either periodically broadcasting Hello messages or constructing multi-layered network structure. However, such trust models would largely increase the communication complexity. The consensus mechanism used in Blockchain gives us a hint to establish a consensus-based trust model in MANETs. To reduce the communication complexity, we use the super peer-based network structure as the application scenario of our trust model, LocTrust, based on which we propose a local consensus algorithm and a global consensus algorithm for different transacting cases. Also, we use the discrete trust expressions to further improve the LocTrust model’s availability. To evaluate the performance, we took a file sharing system as the application scenario of the trust model, where the parameters of the simulation area size, the wireless transmission range, the number of files and the number of peers are employed. Besides, four types of peers are used to simulate the real-world environments, including normal peer (NP), completely malicious peer (CMP), randomly malicious peer (RMP) and feedback malicious peer (FMP). Also, in the simulations, NP:CMP:RMP:FMP is set to 65:15:10:10. The simulation results showed that the LocTrust model could both improve the resource search success rate and reduce the communication complexity under the super peer-based MANET structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Mahapatra B, Patnaik S, Nayyar A (2019) Effect of multiple-agent deployment in MANET. Recent Pat Comput Sci 12(3):180–190

    Article  Google Scholar 

  2. Nayyar A (2012) Simulation based evaluation of reactive routing protocol for MANET. In 2012 Second International Conference on Advanced Computing & Communication Technologies. IEEE: 561–568

  3. Nayyar A (2001) Cross-layer system for cluster based data access in MANET’S. IJCSI. https://doi.org/10.47893/IJCSI.2013.1087

    Article  Google Scholar 

  4. Jahir Y, Atiquzzaman M, Refai H et al (2019) Routing protocols and architecture for disaster area network: A survey. Ad Hoc Netw 82(1):1–14

    Article  Google Scholar 

  5. Cai RJ, Li XJ, Chong PHJ (2019) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55

    Article  Google Scholar 

  6. Sucasas V, Radwan A, Marques H et al (2016) A survey on clustering techniques for cooperative wireless networks. Ad Hoc Netw 47:53–81

    Article  Google Scholar 

  7. Mojamed MA, Kolberg M (2016) Structured Peer-to-Peer overlay deployment on MANET: A survey. Comput Netw 96:29–47

    Article  Google Scholar 

  8. Atsan E, Özkasap Ö (2013) SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks. Comput Netw 57:3654–3672

    Article  Google Scholar 

  9. Orlinski M, Filer N (2013) The rise and fall of spatio-temporal clusters in mobile ad hoc networks. Ad Hoc Netw 11:1641–1654

    Article  Google Scholar 

  10. Banerjee A, King C-T, Hsiao H-C (2017) On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Netw 66(8):95–109

    Article  Google Scholar 

  11. Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23:2455–2472

    Article  Google Scholar 

  12. Amirazodi N, Saghiri AM, Meybodi M (2018) An adaptive algorithm for super-peer selection considering peer’s capacity in mobile peer-to-peer networks based on learning automata. Peer Peer Netw Appl 11(3):74–89

    Article  Google Scholar 

  13. Campbell-Verduyn M, Goguen M (2019) Blockchains, trust and action nets: extending the pathologies of financial globalization. Global Netw 19(3):308–328

    Article  Google Scholar 

  14. Zhong L, Wu Q, Xie J et al (2019) A secure large-scale instant payment system based on blockchain. Comput Secur 84:349–364

    Article  Google Scholar 

  15. Wang W, Hoang DT, Hu P et al (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7:22328–22370

    Article  Google Scholar 

  16. Meng X, Ren S (2016) An outlier mining-based malicious node detection model for hybrid P2P networks. Comput Netw 108(10):29–39

    Article  Google Scholar 

  17. Pathan MS, Zhu N, He J et al (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):1–16

    Article  Google Scholar 

  18. Shabut AM, Kaiser MS, Dahal KP et al (2018) A multidimensional trust evaluation model for MANETs. J Netw Comput Appl 123:32–41

    Article  Google Scholar 

  19. Wu X (2014) Enhanced stable group model-based trust evaluation scheme for mobile P2P networks. Chin J Comput 37(10):2118–2127

    Google Scholar 

  20. Zhu Z, Xu Y, Su Z (2021) A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks. Peer Peer Netw Appl 14:1531–1547

    Article  Google Scholar 

  21. Chen I-R, Guo J (2015) Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Netw 33:154–167

    Article  Google Scholar 

  22. Xia H, Jia Z, Li X et al (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11:2096–2114

    Article  Google Scholar 

  23. Yang H-S, Sun J-H (2016) A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. Peer Peer Netw Appl 9:578–587

    Article  Google Scholar 

  24. Wu X (2012) A distributed trust management model for mobile P2P networks. Peer Peer Netw Appl 5:193–204

    Article  Google Scholar 

  25. Sharma B, Bhatia RS, Singh AK (2015) A Secure Cluster Formation Protocol for Safe Consensus in Hierarchical Mobile Ad Hoc Networks. Int J Sens Wirel Commun Control 5:19–31

    Google Scholar 

  26. Sargunavathi S, Manickam JML (2019) Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks. Clust Comput 22(2):4837–4847

    Article  Google Scholar 

  27. Yang J, He S, Xu Y et al (2019) A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 19(4):1–19

    Article  Google Scholar 

  28. Goka S, Shigeno H (2018) Distributed management system for trust and reward in mobile ad hoc networks. 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE: 1–6

  29. Meng X, Li T, Deng Y (2016) preferTrust: An ordered preferences-based trust model in peer-to-peer networks. J Syst Softw 113(3):309–323

    Article  Google Scholar 

  30. Kim J-H, Lee K-J, Kim T-H et al (2011) Effective routing schemes for double-layered peer-to-peer systems in MANET. J Comput Sci Eng 5(1):19–31

    Article  Google Scholar 

  31. Meng X (2018) sureTrust: A super peer-aware trust model for 2-level P2P networks. Peer Peer Netw Appl 11(3):619–631

    Article  Google Scholar 

  32. Perkins CE, Belding-Royer EM, Das SR (2003) Ad hoc on-demand distance vector (AODV) routing. Internet Draft

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianfu Meng.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, S., Zhang, G. & Meng, X. LocTrust: A local and global consensus-combined trust model in MANETs. Peer-to-Peer Netw. Appl. 15, 355–368 (2022). https://doi.org/10.1007/s12083-021-01250-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01250-y

Keywords

Navigation