Filtering Dishonest Trust Recommendations in Trust Management Systems in Mobile Ad Hoc Networks

作者: Zakir Ullah , Muhammad Hasan Islam , Adnan Ahmed Khan , Sohail Sarwar , None

DOI:

关键词:

摘要: Trust recommendations, having a pivotal role in computation of trust and hence confidence peer to (P2P) environment, if hampered, may entail colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation recommendations is stipulated challenging research issue P2P systems (esp Mobile Ad Hoc Networks). In order cater these challenges associated with technique named “ i ntelligently Selection Recommendations based on Dissimilarity factor ( STRD)” has been devised for Networks.  STRD exploits  personal experience an “evaluating node” conjunction majority vote the recommenders. It successfully removes “low trustworthy recommenders” well “highly recommenders”. Efficacy proposed approach evident enhanced accuracy “recognition rate”, “false rejection” acceptance”.  Moreover, experiential results depict that unprecedented performance compared contemporary techniques presence asserted.

参考文章(35)
Prabhakar Raghavan, Andreas Arning, Rakesh Agrawal, A linear method for deviation detection in large databases knowledge discovery and data mining. pp. 164- 169 ,(1996)
Hiroki Horiuchi, Shinji Motegi, AODV-Based Multipath Routing Protocol for Mobile Ad Hoc Networks IEICE Transactions on Communications. ,vol. 87, pp. 2477- 2483 ,(2004)
Zhenjing Zhang, Maode Ma, Zhigang Jin, TR-SDTN: trust based efficient and scalable routing in hostile social DTNs International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 690482- ,(2015) , 10.1155/2015/690482
Yoshiaki Tanaka, Ryo Yamamoto, Bo Yang, Historical evidence based trust management strategy against black hole attacks in MANET international conference on advanced communication technology. pp. 394- 399 ,(2012)
J. Macker, S. Corson, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations Request For Comments. ,vol. 2501, pp. 1- 12 ,(1999)
Mousumi Sardar, Koushik Majumder, A New Trust Based Secure Routing Scheme in MANET FICTA. pp. 321- 328 ,(2014) , 10.1007/978-3-319-02931-3_36
Al-Sakib Khan Pathan, Tarem Ahmed, Ming Chen, Jianhua Fan, Xianglin Wei, SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems International Journal of Computer Network and Information Security. ,vol. 5, ,(2013)
Zakirullah, M. Hasan Islam, Adnan Ahmed Khan, Detection of dishonest trust recommendations in mobile ad hoc networks international conference on computing communication and networking technologies. pp. 1- 7 ,(2014) , 10.1109/ICCCNT.2014.6962994
Chuanhao Qu, Lei Ju, Zhiping Jia, Huaqiang Xu, Longpeng Zheng, Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks trust security and privacy in computing and communications. pp. 42- 49 ,(2013) , 10.1109/TRUSTCOM.2013.9
Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu, A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks International Journal of Distributed Sensor Networks. ,vol. 9, pp. 652051- ,(2013) , 10.1155/2013/652051