Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks

Sayaka Umeda, Sonoko Takeda, Hiroshi Shigeno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.

Original languageEnglish
Title of host publication2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages143-148
Number of pages6
ISBN (Electronic)9784907626129
DOIs
Publication statusPublished - 2015 Mar 13
Event2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015 - Hakodate, Japan
Duration: 2015 Jan 202015 Jan 22

Publication series

Name2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015

Other

Other2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015
Country/TerritoryJapan
CityHakodate
Period15/1/2015/1/22

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this