Please wait a minute...
Self-archiving model of trust data for mobile ad hoc network
GAO Jian-xin, WU Xu-sheng, GAO Wei, ZHANG Wen-bing
Department of Electrical Engineering, Naval University of Engineering, Wuhan 430033, China
Download:   PDF(1356KB) HTML
Export: BibTeX | EndNote (RIS)      


A self-archiving model of trust data was proposed to solve the problem of distributed trust data storage and retrieval difficulty in mobile ad hoc network (MANET). Digital signature technology was used to ensure the authenticity and integrity of trust data. And corresponding protocols were proposed to ensure that nodes can store its own trust data honestly, avoiding the behavior that nodes do not store poor trust data. Several attack methods aimed at this model were discussed, including negation, forgery and manipulation. Furthermore, GNY logic system indirectly demonstrated that the proposed protocol was secure. Finally, simulation was carried out in MANET with the existence of malicious nodes. The results indicated that the proposed model takes up less network bandwidth, gives good convergence and can ensure trust data accuracy.

Published: 01 June 2015
CLC:  TP 393  
Cite this article:

GAO Jian-xin, WU Xu-sheng, GAO Wei, ZHANG Wen-bing. Self-archiving model of trust data for mobile ad hoc network. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(6): 1022-1030.

URL:     OR



[1] QIN F L, GE L S, LIU Q, et al. Free riding analysis of peer to peer streaming systems [J]. Journal of Computational Information Systems, 2011, 7(3): 721-728.
[2] DIAN S M, RAMADOSS B. A trust agent based incentive mechanism for file sharing in P2P networks [C] ∥ 2nd International Conference on Trends in Information Sciences and Computing Proceeding. Chennai: IEEE, 2010: 167-170.
[3] 方群,吴国新,吴鹏,等.P2P网络信任数据存储机制综述[J].计算机科学,2008,35(11): 23-27.
FANG Qun, WU Guo-xin, WU Peng, et al. Survey of trust data storage mechanism in peer-to-peer network [J]. Computer Science, 2008, 35(11): 23-27.
[4] SEPANDAR D K, MARIO T S, HECTOR G M. The EigenTrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web. Budapest: ACM, 2003: 640-650.
[5] ZHOU R, HWANG K. PowerTrust: a robust and scalable reputation system for trusted Peer-to-Peer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
[6] XIONG L, LU L. PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities [J]. IEEE Transactions on Knowledge Data Engineering, 2004, 16(7): 843-857.
[7] FEDOTOVA N, VELTRI L. Reputation management algorithms for DHT-based peer-to-peer environment [J]. Computer Communications, 2009, 32(12): 1400-1409.
[8] LEE S, SHERWOOD R, BHATTACHARJEE B. Cooperative peer groups in NICE [C] ∥Infocom Twenty-second Joint Conference of the IEEE Computer and Communications IEEE Societies. San Francisco: IEEE, 2003: 1272-1282.
[9] 蒋黎明,张琨,徐建,等.证据信任模型中的信任传递与聚合研究[J].通信学报,2011,32(8): 91-100.
JIANG Li-ming, ZHANG Kun, XU Jian, et al. Research on trust transitivity and aggregation in evidential trust model [J]. Journal on Communications, 2011,32(8): 91-100.
[10] 秦艳琳,吴晓平,高键鑫.分布式环境下信任路径选择性搜索及聚合研究[J].通信学报,2012,33(Z1): 148-156.
QIN Yan-lin, WU Xiao-ping, GAO Jian-xin. Research on selective trust-path search and aggregation in distributed environment [J]. Journal on Communications, 2012, 33(Z1): 148-156.
[11] SEN J. A secure and efficient searching scheme for trusted nodes in a peer-to-peer network [C]∥ Lecture Notes in Computer Science, 2011: 100-108.
[12] ZHAO H Y, YANG X, LI X L. cTrust: trust aggregation in cyclic mobile ad hoc networks [C]∥ Lecture Notes in Computer Science, 2010: 454-465.
[13] 刘连东,冀会芳,韩文报,等.一种无随机预言机的无证书广义签密方案[J]. 软件学报,2012,23(2): 394-410.
LIU Lian-dong, JI Hui-fang, HAN Wen-bao, et al. Certificateless generalized signcryption scheme without random oracles [J]. Journal of Software, 2012, 23(2): 394-410.
[14] ENOS G, ZHENG Y L. An ID-based signcryption scheme with compartmented secret sharing for unsigncryption [J]. Information Processing Letters, 2015, 115: 128-133.
[15] 王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4): 93-98.
WANG Sheng-bao, LIU Wen-hao, XIE Qi. Cerificateless signature scheme without bilinear pairings [J]. Journal on Communications, 2012,33(4): 93-98.
[16] GODOR G, IMRE S. Security analysis of the simple lightweight authentication protocol [C]∥ Ninth International Conference on Networks. French Alps: IEEE, 2010: 231-236.
[1] LI Jian-li, DING Ding, LI Tao. Multi-objective hybrid cloud task scheduling using twice clustering[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1233-1241.
[2] ZHANG Xin-xin, XU Ke, ZHONG Yi-Feng, SU Hui. Evolutionary game analysis on cooperative behaviors of  internet service providers[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1214-1224.
[3] YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1181-1189.
[4] WANG Yu-xiang, LI Sheng-jie, WANG Hao, MA Jun-yi, WANG Ya-sha, ZHANG Da-qing. Survey on Wi-Fi based contactless activity recognition[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 648-654.
[5] QIAN Liang-fang, ZHANG Sen-lin, LIU Mei-qin. Reservation-based MAC protocol for underwater wireless sensor networks with data train[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 691-696.
[6] LI Xiao-dong, ZHU Yue-fei, LIU Sheng-li, XIAO Rui-qing. Permission-based Android application security evaluation method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 590-597.
[7] HUANG Yan, WANG Peng, XIE Gao hui, AN Jun xiu. Data center energy cost optimization in smart grid: a review[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(12): 2386-2399.
[8] YU Yang,XIA Chun he,YUAN Zhi chao,LI Zhong. Trust bootstrapping model for computer network collaborative defense system[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(9): 1684-1694.
[9] QI Ping, LI Long shu, LI Xue jun. Cloud resource scheduling algorithm with failure recovery mechanism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(12): 2305-2315.
[10] SU Kai, MA Liang-li, SUN Yu-fei, GUO Xiao-ming. Non-negative matrix factorization model for Web service QoS prediction[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(7): 1358-1366.
[11] GAO Meng-zhou, FENG Dong-qin, LING Cong-li, CHU Jian. Vulnerability analysis of industrial control system based on attack graph[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2014, 48(12): 2123-2131.
[12] REN Wu-ling, ZHAO Cui-wen, JIANG Guo-xin,David Maimon, Theodore Wilson, Bertrand Sobesto. Network defense strategy based on cyber attack behavior prediction[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2014, 48(12): 2144-2151.
[13] I De-jun,WANG Gang,YANG Can-jun,JIN Bo,CHEN Yan-hu. NTP/IEEE1588-based time synchronization system in seafloor observatory network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2014, 48(1): 1-7.
[14] GUO Tong,LIN Feng. Bayesian network structure learning based on hybrid genetic
and fish swarm algorithm
[15] LIU Duan-yang , Xie Jian-ping, CAO Yan-long. Research on divisible load scheduling algorithm based on energy model[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2013, 47(9): 1547-1553.