Visible to the public Research of trust model based on fuzzy theory in mobile ad hoc networks

TitleResearch of trust model based on fuzzy theory in mobile ad hoc networks
Publication TypeJournal Article
Year of Publication2014
AuthorsHui Xia, Zhiping Jia, Sha, E.H.-M.
JournalInformation Security, IET
Date PublishedMarch
Keywordsanalytic hierarchy process, decision making, decision-making, entropy weight method, FAPtrust, fuzzy analytic hierarchy process theory, Fuzzy logic, fuzzy set theory, fuzzy theory, information-theoretic framework, malicious node detection, mobile ad hoc network security, mobile ad hoc networks, multi-agent system, multi-agent systems, multicast protocols, multiple trust decision factor, network interaction quality, network trust dynamic adaptability, Routing protocols, telecommunication security, trust model, trust-based multicast routing protocol

The performance of ad hoc networks depends on the cooperative and trust nature of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without central authorities. An information-theoretic framework is presented, to quantitatively measure trust and build a novel trust model (FAPtrust) with multiple trust decision factors. These decision factors are incorporated to reflect trust relationship's complexity and uncertainty in various angles. The weight of these factors is set up using fuzzy analytic hierarchy process theory based on entropy weight method, which makes the model has a better rationality. Moreover, the fuzzy logic rules prediction mechanism is adopted to update a node's trust for future decision-making. As an application of this model, a novel reactive trust-based multicast routing protocol is proposed. This new trusted protocol provides a flexible and feasible approach in routing decision-making, taking into account both the trust constraint and the malicious node detection in multi-agent systems. Comprehensive experiments have been conducted to evaluate the efficiency of trust model and multicast trust enhancement in the improvement of network interaction quality, trust dynamic adaptability, malicious node identification, attack resistance and enhancements of system's security.

Citation Key6748543