Recommendation Based Trust Model with an Effective Defence Scheme for MANETs

Antesar M. Shabut, Keshav P. Dahal, Sanat Kumar Bista, Irfan U. Awan

    Research output: Contribution to journalArticlepeer-review

    140 Citations (Scopus)
    185 Downloads (Pure)

    Abstract

    The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that adopts recommendations by other nodes in the network is a challenging problem due to the risk of dishonest recommendations like bad-mouthing, ballot-stuffing, and collusion. This paper investigates the problems related to attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme, which utilises clustering technique to dynamically filter out attacks related to dishonest recommendations between certain time based on number of interactions, compatibility of information and closeness between the nodes. The model is empirically tested under several mobile and disconnected topologies in which nodes experience changes in their neighbourhood leading to frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
    Original languageEnglish
    Pages (from-to)2101-2115
    Number of pages15
    JournalIEEE Transactions on Mobile Computing
    Volume14
    Issue number10
    DOIs
    Publication statusPublished - 1 Oct 2015

    Keywords

    • Dishonest recommendation
    • filtering algorithm
    • mobile ad hoc networks
    • recommendation attacks
    • recommendation management
    • Trust management models

    Fingerprint

    Dive into the research topics of 'Recommendation Based Trust Model with an Effective Defence Scheme for MANETs'. Together they form a unique fingerprint.

    Cite this