Title : 
Trust-Enhanced Multicast Routing Protocol Based on Node´s Behavior Assessment for MANETs
         
        
            Author : 
Hui Xia ; Jia Yu ; Zhi-Yong Zhang ; Xiang-Guo Cheng ; Zhen-Kuan Pan
         
        
            Author_Institution : 
Postdoctoral Res. Station of Syst. Sci., Qingdao Univ., Qingdao, China
         
        
        
        
        
        
            Abstract : 
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced routing protocol could provide a better quality of service. In this study, we abstract a basic decentralized effective trust inference model based on node´s behavior assessment, where each peer assigns a trust value for a set of peers of interest. In this model, we introduce the ´voting´ mechanism to access the recommending experience (or ratings), in order to reduce the cost of the algorithm design and the system overhead. Then combined with this trust model, a novel trust-enhanced multicast routing protocol (TeMR) is proposed. This new protocol introduces the group-shared tree strategy, which establishes more efficient multicast routes since it uses ´trust´ factor to improve the efficiency and robustness of the forwarding tree. Moreover, it provides a flexible and feasible approach in routing decision making with trust constraint and malicious node detection. Experiments have been conducted to evaluate the effectiveness of the proposed protocol.
         
        
            Keywords : 
decision making; mobile ad hoc networks; multicast protocols; quality of service; radio links; routing protocols; MANET; cryptosystem; decision making; group-shared tree strategy; malicious node detection; malicious nodes; mobile ad hoc network; mobile nodes; packet routing; quality of service; trust constraint; trust inference model; trust-enhanced multicast routing protocol; wireless links; Ad hoc networks; Mobile computing; Monitoring; Peer-to-peer computing; Routing; Routing protocols; Ad Hoc Network; Malicious Node; Routing Decision Making; Trust Constraint; Trust Model; Trust-enhanced Multicast Routing;
         
        
        
        
            Conference_Titel : 
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
         
        
            Conference_Location : 
Beijing
         
        
        
            DOI : 
10.1109/TrustCom.2014.60