Cart (Loading....) | Create Account
Close category search window
 

Cooperative communications based on trust model for mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Wang, K. ; Inst. of IOT & WSN, Nanjing Univ. of Posts & Telecommun., Nanjing, China ; Wu, M.

Wireless networks provide a realm in which cooperation among large numbers of egoists can be attained. As the non-cooperative behaviours of nodes will significantly degrade the network performance, effective cooperation incentive of nodes has become a hot issue in cooperative communication. Although a reputation system can stimulate nodes to cooperate with each other, the recommendation-based trust model may cause a decline in network performance, because of fake recommendation, convergence of iteration and node redemption. To address the above issues, a topology transform-based recommendation trust model is proposed to relieve the malicious effects on the accuracy of recommendation trust, which stem from fake recommendation. Some mathematical analysis and simulation results reveal that the global trust of this proposed trust model has convergence characteristic, and the reputation system with this model can more effectively stimulate node cooperation and performs better in terms of packet successful delivery ratio and mean number of packets dropped. Moreover, the topology transform-based recommendation trust algorithm makes this reputation system more suitable for large-scale networks.

Published in:

Information Security, IET  (Volume:4 ,  Issue: 2 )

Date of Publication:

June 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.