Abstract

A trust management mechanism for mobile ad hoc networks (MANETs) is proposed to cope with security issues that MANETs face due to time constraints as well as resource constraints in bandwidth, computational power, battery life, and unique wireless characteristics. The trust-based reputation scheme GlobalTrust is a reliable trust management mechanism. In this paper, a clustering algorithm is applied to the GlobalTrust scheme (named Cluster-based GlobalTrust (CGTrust)) to find the optimal group size to minimize the configuration time, which consists of trust information computational time and complexity, while having to satisfy the trust reliability requirements. The optimal number of clusters is derived from the minimizing point of the computation complexity function. Simulation results show that the computational time and complexity of CGTrust are controllable and can be used effectively in time critical network operations that require trust analysis.

Highlights

  • Mobile ad hoc networks (MANETs) consist of distributed wireless mobile nodes

  • Trust evaluations are made on node reputation, which is the perception of a node evaluated by other nodes

  • The results show that Cluster-based GlobalTrust (CGTrust) can significantly reduce the required computations and thereby reduce the network’s trust evaluation time

Read more

Summary

Introduction

Mobile ad hoc networks (MANETs) consist of distributed wireless mobile nodes. In MANETs, it is critical to make a decision of assessing the trustworthiness of participating nodes accurately by a trust authority. The cosine similarity (Sim(CHi, CHk)) in Eq (6) is calculated on the basis of the LTO between the CH communication This allows the TA to determine if a CH is infected and can make a final decision. The TA evaluates each CH’s trustworthiness using direct trust computation, which can be conducted using the encrypted packet mode, which encrypts packets exchanged between non-CH nodes and the TA. Using the encrypted packet mode, the TA computes the CHs’ trustworthy level periodically considering β, which is the ratio of nodes that use encrypted packet mode in the cluster. In this computation process, β is a variable that represents the possibility that a CH is a malicious node. Considering the computational complexity of trust computation and the worst case where the majority of CHs are infected, the suitable value of β is [0, 0.5]

Computational complexity analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call