• DocumentCode
    2907079
  • Title

    An Individual Behavior-Based Trust Routing Model for Ad Hoc Networks

  • Author

    Bo Wang ; Chuanhe Huang ; Wenzhong Yang ; Tong Wang

  • Author_Institution
    Sch. of Comput., Wuhan Univ., Wuhan, China
  • Volume
    2
  • fYear
    2009
  • fDate
    18-20 Nov. 2009
  • Firstpage
    454
  • Lastpage
    457
  • Abstract
    The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network that try to disrupt, distort or disturb the network traffic. So, this paper defines the method of the trust value computation associated with the behaviors of communication with its one-hop neighbor nodes reliably, timely, and integrally. After using a trust graph theoretic, we establish a trust routing model to evaluate and maintain trust relationships from the aspects of direct and indirect trust level to discover a most trustworthy routing. The simulation shows that the proposed model and algorithm can detect effectively malicious behaviors, bypass the malicious nodes, so as to improve the network packet delivery fraction, routing overhead and decrease the average end-to-end delay.
  • Keywords
    ad hoc networks; telecommunication network routing; telecommunication security; ad hoc networks; behavior-based trust routing model; benevolent nodes; distributed links; malicious nodes; network packet delivery fraction; one-hop neighbor nodes; trust graph theoretic; Ad hoc networks; Collaborative work; Computational modeling; Data security; Delay effects; Maintenance; Routing; Telecommunication network reliability; Telecommunication traffic; Traffic control; ad hoc networks; routing protocol; security; trust;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
  • Conference_Location
    Hubei
  • Print_ISBN
    978-0-7695-3843-3
  • Electronic_ISBN
    978-1-4244-5068-8
  • Type

    conf

  • DOI
    10.1109/MINES.2009.223
  • Filename
    5368841