| Literature DB >> 30917499 |
Waleed Alnumay1, Uttam Ghosh2, Pushpita Chatterjee3.
Abstract
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.Entities:
Keywords: ARMA; GARCH; IoT; MANET; clustering; predictive; security; trust
Year: 2019 PMID: 30917499 PMCID: PMC6471957 DOI: 10.3390/s19061467
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The trust model
Figure 2Trust generation
Figure 3Resultant trust generation
Simulation parameters and environment.
| Simulation Parameter | Assigned Value |
|---|---|
| Application Agent | CBR |
| Packet Size | 512 bytes |
| Transport Agent | UDP |
| Routing Protocol | AODV |
| Network area | 450 × 450 |
| No. of nodes | 21 |
| No. of malicious nodes | 5 |
| Mobility Model | Random Way-Point |
| Addressing Scheme | IDDIP |
| Mobility | 0–5 m/s |
| Pause Time | 5 s |
| Simulation Time | 500 s |
Figure 4False positive vs. packet collision.
Figure 5Packet delivery fraction vs. % of malicious nodes.
Figure 6Packet drop rate vs. % of malicious nodes.
Figure 7Packet delivery ratio vs. number of malicious nodes.
Figure 8Throughput vs. number of malicious nodes.