About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 652051, 12 pages
Research Article

A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks

School of Instrumentation Science and Opto-Electronics Engineering, Beihang University, Beijing 100191, China

Received 8 January 2013; Accepted 20 March 2013

Academic Editor: Adel Soudani

Copyright © 2013 Renjian Feng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Many existing routing protocols in Mobile Ad hoc Networks (MANETs) focus on finding paths in dynamic networks without considering security. In this paper, we propose a trust model which evaluates neighbours’ direct trust by factors of encounter time, mobility, and successful cooperation frequency. The revised D-S evidence theory is used to combine multiple recommended pieces of evidence and obtain the recommended trust value. Then based on the novel trust mechanism, we propose a trusted routing protocol named TDS-AODV protocol by extending the AODV protocol. In this protocol, a node makes a routing decision according to the trust values of its neighbour nodes. Finally, two routes are built: the main route with highest route trust value in the candidate routes and a backup route. Simulation results reveal that TDS-AODV can eliminate malicious nodes effectively when building the route; furthermore, it also achieves better performance than TAODV and AODV in terms of throughput, packet delivery ratio, and average end to end delay.

1. Introduction

The past decade has witnessed tremendous research efforts devoted to Mobile Ad hoc Networks (MANETs). MANETs are temporary autonomous systems with the special characteristics of dynamic network topology, limited computational abilities, and continuously changing scale. Due to its flexibility, a MANET is attractive for applications, such as disaster relief, military service, and robot networks [1]. However, this flexibility also causes security problems. Routing security is one of the challenging issues in current research.

Traditional MANET routing protocols, such as destination-sequenced distance vector routing (DSDV) [2], dynamic source routing (DSR) [3], and ad hoc on-demand distance vector routing (AODV) [4], assume that all nodes in the network work in a benevolent manner and no predefined trust exists between communication partners. However, the fact is that malicious behavior among nodes exists; for example, selfish nodes deny relaying the packets of other nodes, and malicious nodes perform impersonation, fabrication, or modification attacks against the network traffic [5]. Hence, it is necessary to incorporate security mechanisms into MANET routing protocols to mitigate the impairment from malicious nodes. However, the security mechanism basing on the traditional cryptosystem is used to resist external attacks, but it cannot effectively solve the internal attacks by malicious nodes [6]. Therefore, the trust mechanism which is considered to be an effective measure to solve those questions has recently been studied.

In our trust mechanism, the successful cooperation frequency factor is considered in direct trust evaluation to guarantee the security of network. It is calculated according to its accumulated observations using the Bayesian inference which adopts Beta distribution. Unlike most trust mechanisms [712] that focus on trust evaluation without considering performance of the network, we take other two factors (factors of encounter time and mobility) into account. A good network performance can help save nodes' limited resources and prolong the network lifetime, which is very important in MANET. The network topology in MANET is dynamic; hence, the next hop of a node may not be its next hop the next moment. To create a relatively stable network topology as much as possible, we propose two factors, nodes' average encounter time and mobility, when calculating nodes' direct trust value. The two factors make the trust mechanism more suitable for resource-restricted MANET. D-S evidence theory, which was first introduced by statistician of Dempster [13] and extended by Shafer [14], is used to calculate direct trust value, integrate indirect evidence, and obtain the overall trust value. We choose D-S evidence here because it does well in dealing with the uncertainty of trust value.

Based on the novel trust mechanism, we put forward a trusted routing protocol, by extending the AODV protocol in MANETs, TDS-AODV for short. In this protocol, a node evaluates its neighbours' trust value according to the trust model and selects reliable nodes as its next-hop nodes. A source can establish multiple reliable paths to a destination in one route discovery process. We consider the number of hops as well as the trust value of paths to the destination. A destination will respond with three shortest paths as candidates and the path trust will be calculated during the process of Route Reply () Message delivery. The one with maximum path trust will be selected as the forwarding route and the second reliable one will be regarded as the backup route. We perform some simulations to compare the performance of TAODV, AODV, and TDS-AODV on Matlab platform. Simulation results show that our method is practical to detect malicious nodes and outperform TAODV and AODV in throughput, packet delivery ratio, and average end to end delay.

The rest of this paper is organized as follows. Section 2 summarizes the related work on trust evaluation and trust-based routing protocols. Section 3 presents the novel trust evaluation mechanism. Section 4 describes TDS-AODV in detail. Section 5 provides the simulation studies. Finally, we conclude this paper in Section 6.

2. Related Works

Researchers are becoming more and more interested in integrating trust into a MANET and have proposed numerous works. In this section, we first focus our attention on trust evaluation models in MANETs and then discuss the trust based routing protocols in MANETs.

2.1. Trust Evaluation

Peng et al. [7] assessed the subjective trust of nodes through the Bayesian method, but they were not able to detect dishonest recommendations. Zouridaki et al. [8] chose to determine the node trustworthiness with respect to reliable packet forwarding by combining first-hand trust and second-hand trust information. However, the trust calculation in unsupervised ad hoc environment involved complex aspects such as availability and mobility. besides packet forwarding. Omar et al. [9] sought to establish a fully distributed trust model based on trust graphs and threshold cryptography.

At present, most of the trust evaluation literatures ignore the uncertainty of trust value. To deal with this problem, some researchers [1012] resort to D-S evidence theory. D-S evidence theory has the capacity of expressing directly for “uncertain,” which makes it suitable to calculate the trust value in MANETs. Xie et al. [10] proposed a trust model for MANETs based on D-S evidence theory. The model can be a good solution for the combination of pieces of evidence, but it failed in addressing the issues concerning conflicting recommendation pieces of evidence. In this paper, we adopt the revised D-S combination rule which includes a consistent intensity to calculate nodes' trust value.

2.2. Trust-Based Routing Protocols

Wang and Wu [15] introduced the trust metric which depended on network traffic statistics to evaluate the trust and then loaded the trust model on the previously proposed distance-based location-aided routing (). The algorithm utilized direct trust and recommendation trust to prevent malicious nodes from joining the forwarding. Li et al. [16] built a simple trust model to evaluate neighbours' behaviours forwarding packets and proposed a trust-based reactive multipath routing protocol extending from AODV. Peng et al. [17] incorporated a new dynamic trust mechanism which was based on multiple constraints and collaborative filtering into the extending DSR. Narula et al. [18] selected soft encryption systems and implemented them in conjunction with a trust-based reputation system and a multipath routing to provide a secure routing scheme. The implementation of this trust-based approach using DSR was then discussed. Sirotheau and Sousa [19] proposed an evaluation mechanism that aimed to mitigate routing misbehavior and other network failures. Four attributes of the routes were considered: level of activity, trust, mobility, and number of hops.

When transmitting a packet to a given destination, a node may have two routes: one is short but incredible while the other is long but credible. One of our main aims is to design a rational strategy which involves both hop counts and trust values in making decisions. The detailed implementation of our scheme is a secure extension of the AODV. Because of its ability to cope with network dynamic changes and repair broken links in routes, AODV is one of the promising protocols for deployment in a MANET.

3. Trust Model Based on D-S Evidence Theory

Trust model essentially performs trust derivation, computation, and application [20]. Trust applications including trust-based route discovery and route selection will be discussed in the next section.

3.1. D-S Evidence Theory

D-S evidence theory is based on the identification frame set comprised by basic propositions which are both exclusive and exhaustive. is the power set of , that is, the set of all the possible propositions based on . Here we define as , where and represent two trust states, namely, credible and incredible. is , in which , ,, and represent the empty set, the propositions of nodes' “Trust”, “Distrust”, and “Uncertain”, respectively. There are definitions of basic reliability function on : , Belief : and Plausibility : , satisfying the following equations: where is named focal element, is the basic confidence level of , representing how much the evidence supports to happen.

The difference between Belief and Plausibility is referred to as Belief Interval. It is represented by the range of maximum uncertainty. The relationship of Belief and Plausibility is shown in Figure 1.

Figure 1: Belief (Bel) and Plausibility (Pl).
3.2. Trust Factors

The definition of “Trust” in this paper refers to the confidence that node has on node about the ability to forward packets successfully. Nodes tend to select the neighbour that has higher trust value as the intermediate node. In general, the trust between nodes only has some connection with malicious behaviors; however, we should consider more factors that depend on the interactions between neighbour nodes in a MANET due to its flexibility.

3.2.1. Factor of Average Encounter Time

The concept of average encounter time does well in quantifying node's encounter history record. Encounter means that two nodes enter each other's wireless transmission range. The larger the is, the more possibly node chooses node as the next hop. The during period is calculated by the following equation If two nodes enter each other's wireless transmission range , else . For example, in Figure 2, node and node encounter three times during period ; the AC is:

Figure 2: Average encounter time.
3.2.2. Factor of Mobility

The topology of MANET is dynamic due to the node movement; hence, in order to establish a more stable routing, it is necessary to take the node mobility into account when a node selects its cooperative nodes. The factor is constructed as where denotes the distance between node and node at time , and are the coordinates of node and node at time , respectively.

3.2.3.  Factor of Successful Cooperation Frequency

Node has a detection mechanism to obtain its interaction results with node . and , respectively, denote the number of successful cooperation and unsuccessful cooperation about node observed by node . Suppose can be easily expressed by beta distribution, that is, . The factor is constructed as

Once node behaves badly, will increase and will decrease, which leads to the decrease of the possibility that node chooses node as the next hop.

3.3. Direct Trust

Subject node monitors the behaviors of object node in one cycle and acquires the current trust value based on the following expression: where , are determined by specific application environment, usually ,  as security is more important.

Furthermore, the direct trust value is recalculated in accordance with history records. Assuming the direct trust value of latest cycle is , the update of direct trust value is calculated as follows: where is the direct trust value of subject node on object node in current cycle, parameter is the adaptive time factor used to weigh history experience against current information. To keep preferably dynamic characteristic, it is satisfied as where , the parameter and represent the trust components of and , respectively.

3.4. Recommendation Trust Evaluation
3.4.1. Trust Transitivity

Suppose the recommended trust value of node on node can be obtained through different paths, and the number of recommendation paths depends on nodes' distribution and communication radius. In order to avoid trust recycle recursion and decrease network communication payload, the recommendation values are confined to direct trust value of the common neighbours owned by both node and node . As shown in Figure 3, node can get the trust recommendation of node from .

Figure 3: Recommendation relationship between subject node and object node .

denotes the recommended trust value of node on node through recommendation path . The vector forms of , , are as follows:

Let us set , , and . Then, the is calculated as follows:

Using the symbol to denote this operation, we get

To vividly show the process of trust transitivity, we resort to Figure 4. It is obvious to see that as long as one of and is distrust, then is distrust.

Figure 4: The process of trust transitivity.

Extending the above transitivity to multihop, we can get recommended trust through complex recommendation paths with many middle nodes where the symbol indicates anonymous nodes in recommendation path.

3.4.2. Dynamic Aggregation of Recommended Trust

On the basis of trust transitivity, node obtains recommended trust values on node through recommendation paths, namely,

Then, node would aggregate these pieces of evidence to get a consensus on node . Due to the existence of malicious nodes that may offer false recommendation, we introduce the revised D-S combination rule which adopts a consistent intensity to adjust weights of recommended trust values. The integration process is described in detail as follows.

Firstly, we compute the corresponding average weight denoted as . The consistent intensity between and is defined as follows [21]: where , , is the inner product of and .

The difference between two pieces of recommended trust evidence increases with the reduction of consistent intensity. The lower the consistent intensity is, the more probably false trust recommendation may occur.

Furthermore, the matrix of consistent intensity composed of all the recommended trust values is defined as follows:

Through summation in row and normalization, the totally consistent intensity of recommended trust , which is equal to the average weight , is computed by

Then, the basic reliability function of every recommended trust evidence is amended by as follows: Next, we apply the amended basic trust reliability function to D-S combination rule. Assume that and are two trust degree functions that are on the same identification frame ; their basic reliability degree functions are and . And , the basic trust reliability function of , can be expressed as follows: where is called “Direct Sum,” representing the combinatorial operation between pieces of evidence.

Extending to independent pieces of evidence which belongs to the same identification frame , we can get

At last, the consistent recommended trust is obtained.

3.5. Overall Trust Value Synthesis

Through the observation and recommendation from neighbour nodes, subject node computes and . The D-S evidence theory can combine conflicting and uncertain information to make a correct decision and accelerate converge rate of trust calculation. Consequently, it is used to synthesize and for the overall trust value :

Algorithm 1 shows the process that subject node judges whether node is “Trust”, “Distrust” or “Uncertain”. The threshold values and are determined by specific application environment; here, we define and . If the trust component is the biggest and the uncertain component is smaller than , node regards node as “Trust.” If the distrust component is the biggest and the uncertain component is smaller than , node regards node as “Distrust.” Otherwise, node regards node as “Uncertain”.

Algorithm 1: Process of judging node ’s style.

4. Trust-Based Routing Protocol

In this section, we extend the AODV protocol to which can establish trusted route with minimum hops and maximum path trust based on trust mechanism denoted by TDS-AODV. The differences between AODV and TDS-AODV are listed as follows. (1)We append the model of trust computation and fields including , , , and in the neighbour table of each node.(2)Every node maintains a local black list.(3)We append field in the route reply message and denotes the accumulated route trust.(4)We set backup route to avoid initiating the route discovery frequently.

4.1. Route Discovery

During the process of route discovery, when node chooses another node to forward a packet, node may suffer some attacks from node , such as black hole attack. Thus, it is important to choose a reliable next hop node. The process of judging whether node can be the next hop of node is as follows.

Step 1. Node checks whether it has the trust value of node (); if it has, turn to Step 5, else turn to Step 2.

Step 2. Node computes according to (6)–(8) and broadcasts a message to the common neighbours denoted as node .

Step 3. After receiving the message, node sends to node if .

Step 4. Node calculates based on (13)–(18) and based on (19).

Step 5. Whether node is reliable can be estimated using Algorithm 1. If node is trusted, node will update and regards node as its credible next hop node, else node will not choose node to transmit packets and move node into its local black list as a malicious node.

Once a node is in a black list, it will neither receive packets from its neighbour nor have its packets forwarded. That is, a malicious node in a black list is excluded by its neighbours. When a node exists in the black lists of all its neighbours, it will be excluded from the local network.

Sending packets by the trusted route will decrease the probability of malicious attacks and improve the survivability of MANETs. We evaluate the trustworthiness of a route by the trust value of nodes along the route, denoted by [16] where and are any two adjacent nodes among the route; is the destination node in the route; means that is the next hop node of ; means that the destination node should not forward the packets for itself and is not used to calculate the path trust to node .

As shown in Figure 5, the trust value of path is equal to 0.68 (i.e. ). Figure 6 shows an example of a multiple path. Among the three paths from to , path is the most credible path.

Figure 5: Path trust computation of a single path.
Figure 6: Path trust computation of a multiple path.

In our trusted routing mechanism, the route discovery includes three processes: (i) Route Request () Message Delivery; (ii) Route Reply () Message Delivery; and (iii) route selection.

4.1.1. Delivery

An packet contains the following fields: , , , , , .

When the source node needs to send data to the destination node , it first checks whether there is a feasible path found between and . If so, sends the data to ; otherwise, will broadcast a to start a route discovery.

When any reliable intermediate node whose authentication process was discussed before receives a packet from a neighbour , it deals with the request according to the following steps.

Step 1. It checks whether one copy of the same has been received according to the . If so and the later copy has greater , the will be discarded and the procedure ends; otherwise, go to Step 2.

Step 2. If node is not the source, node creates a reverse route to using the previous hop (node ) of the as the next hop.

Step 3. checks whether there is a valid route to the destination. If so and the of the route is greater than that in the , unicasts a Route Replay () message to via through the reverse route; otherwise, go to Step 4.

Step 4. increases by one and propagates the to all its neighbours.

The pseudocode of the is shown in Algorithm 2.

Algorithm 2: The delivery algorithm.

4.1.2. Delivery

An packet contains the following information: , , , , , , . When receives the packet, it deals with the request according to the following steps.

Step 1. If it is the first time for to receive a packet, then sets a timer window and records the route of in its cache and go to Step 6, otherwise go to Step 2.

Step 2. If expires, it discards the follow-up packets, otherwise go to Step 3.

Step 3. If there are less than three routes in the cache of , then add the new route in its cache and go to Step 6, otherwise go to Step 4.

Step 4. compares the hop count of the new route with that of the route which owns the maximum hop count in its cache (denoted as route ). If the former is more than or equal to the latter, discards the new , otherwise turn to Step 5.

Step 5. uses the new route to substitute route and then turns to Step 6.

Step 6. sets and then unicasts the packets with to the intermediate node.

After receiving a packet, the intermediate node computes according to (21) and updates the field of then it forwards the packet with . The pseudo code of delivery algorithm is shown in Algorithm 3.

Algorithm 3: The delivery algorithm.

4.1.3. Route Selection

When receives the packet, if the timer window does not expire, it needs to update the field of this message according to (21). Otherwise, discards follow-up packets and picks the one with largest as its main route. The route with second largest is regarded as backup route which aims at avoiding initiating the route discovery frequently. The pseudo code of route selection algorithm is shown in Algorithm 4.

Algorithm 4: The route selection algorithm.

4.2. Route Maintenance

After each successful route discovery takes place, can deliver its data to through a route. However, the route may break at any time instant due to the mobility of nodes or attacks. In order to maintain a stable and secure network connection, route maintenance is necessary to ensure the system survivability. AODV protocol designed two types of route maintenance mode one is a local repair mechanism and the other is that reestablishes the route. Detailed process is discussed as follows.

Once the route is found, each node along the route periodically sends messages to its neighbour node for link failure detection. Link failure occurs when the neighbour node does not reply to the messages after a period of time. When a node detects a link failure, it first sends a Route Error () message to . checks whether there is a backup route; if a backup route is found, replaces the failure route with the backup and sends a message to . Otherwise sends a message to and then starts a local repair mechanism. broadcasts a message to find an alternative route between and . If no route is found, the system resorts back to another mechanism of sending a message upstream to , starting a new route discovery.

In TDS-AODV, besides link failure, if , will also perform route maintenance which works as follows. During the transmission, if finds the trust of a route has decreased, it sends a route check message along the route to check the route status and sets a timeout period to wait for the route check message from . When receives the reply, it will update the and judge whether is larger than . If , resorts to the backup route and updates the path trust of the backup route (denoted as ). If , discards the main route and uses the backup route to send packets. Otherwise, a new route discovery is triggered.

5. Simulation Studies

To evaluate the performance of TDS-AODV, we use the simulation tool MATLAB. In our simulation, fifty nodes at first are randomly placed in a specific field (100 m 100 m) and move to another random position with a speed chosen between 0 to 30 m/s. The malicious nodes randomly drop data packets based on their trust value. The simulation parameters are listed in Table 1.

Table 1: Simulation parameters.
5.1. Performance Metrics

To measure the performance of our proposed TDS-AODV, we identify three metrics: (i) throughput: the number of packets transmitted per unit time from the source node to the destination node; (ii) packet delivery ratio: the ratio of the number of packets received to the total number of packets; and (iii) average end to end delay: the average delay between the sending of the packets by the source node and its receipt at the destination node.

The network topology of TDS-AODV was compared with that of TAODV [22] and AODV in this paper. We also carried out three simulations in terms of the maximum node speed and the proportion of malicious nodes to compare the above three performances of two protocol.

5.2. Simulation Results and Analysis

Figures 7 and 8 are the network topology of TDS-AODV and AODV with 20 malicious nodes. It is obvious to see that our method can avoid malicious nodes becoming the next hop effectively while in AODV malicious nodes can be selected as the next hop. The reason is that TDS-AODV takes nodes' trust value into account.

Figure 7: Network topology of TDS-AODV.
Figure 8: Network topology of AODV.

Figure 9 shows the average routing hop of TDS-AODV and AODV with different numbers of malicious nodes. when the number of malicious nodes accounts for a certain proportion of the number of total nodes, the average route hop of TDS-AODV is a little higher than that of AODV, because nodes would rather choose a relative longer path than choose malicious nodes as the next hop nodes in TDS-AODV. Although the path of TDS-AODV may be a little longer, the performance of TDS-AODV is still better than that of AODV as it eliminates malicious nodes out of the routing paths, which will be proven by the following simulation experiments.

Figure 9: Everage route hop of TDS-AODV and AODV with different numbers of malicious nodes.

Figures 10 and 11 depict the throughput of TDS-AODV, TAODV, and AODV. The routing throughput of TDS-AODV is averagely 29.60 lower than that of AODV and 21.27 lower than that of TAODV in Figure 10. This is because that our method can detect malicious nodes effectively and thus prevent the channel congestion. The throughput changes little at different maximum speed which indicates our method has excellent dynamic. As shown in Figure 11, the throughput rises slowly with the increase in the number of malicious nodes. Besides, TDS-AODV rises more slowly than TAODV and AODV as it prevents the malicious nodes from becoming the next hop and affects less by malicious nodes.

Figure 10: Performance of network throughput at different maximum speed.
Figure 11: Performance of network throughput with different number of malicious nodes.

The packet delivery ratio of TDS-AODV, TAODV, and AODV is shown in Figures 12 and 13. It can be observed that TDS-AODV outperforms TAODV and AODV in the packet delivery ratio because of the fact that in TDS-AODV intermediate nodes make routing selection considering hop count and trust value. It shows the packet delivery ratio of TDS-AODV is averagely 46.24 higher than that of AODV and 17.18 higher than that of TAODV in Figure 12. Figure 13 indicates that TDS-AODV has better fault tolerance as its packet delivery ratio declines slowly with the increase in the number of malicious nodes.

Figure 12: Performance of packet delivery ratio at different maximum speed.
Figure 13: Performance of packet delivery ratio with different number of malicious nodes.

We give the average end to end delay comparisons of TDS-AODV, TAODV, and AODV in Figures 14 and 15. As shown in Figure 14, the average end-to-end delay of three schemes rises very slowly with the increase in the maximum speed. However, the average delay of AODV is 18.73 higher than that of TDS-AODV and the average delay of TAODV is 7.74 higher than that of TDS-AODV in Figure 14 due to the lack of consideration of dynamic topology. Figure 15 depicts the performance of average delay with different number of malicious nodes. The average end to end delay of TDS-AODV declines faster than AODV. Because when intermediate nodes choose the next hop they will not consider the malicious nodes and thus save the time.

Figure 14: Performance of average delay at different maximum speed.
Figure 15: Performance of average delay with different number of malicious nodes.

6. Conclusions

In this paper, we propose a novel trust mechanism after investigating on trust models of ad hoc networks and routing in current researches. In this trust mechanism, direct trust value on each neighbour node is calculated by using trust factors of average encounter time, mobility, and successful cooperation frequency, which are defined according to node behaviors. Meanwhile, the revised D-S evidence theory is used to combine multiple recommended pieces of evidence and obtain the recommended trust value. Then, a trusted routing protocol based on the novel trust mechanism, by extending the AODV protocol is presented. In this protocol, a source establishes a main path and a backup path which are evaluated by two aspects: hop counts and trust values. At last, we validate the correctness and effectiveness of TDS-AODV by comparing its performance with TAODV and AODV on Matlab platform. Simulation results show that TDS-AODV is able to eliminate malicious nodes effectively when building the route and achieves an improvement in throughput, packet delivery ratio, and average end-to-end delay.

In our future work, we will conduct extensively simulation and rigorous analysis to quantify and evaluate the tradeoff between the security and the nodes' energy consumption. In addition, a comprehensive performance evaluation will be conducted to compare TDS-AODV with other routing protocols (e.g., DSR).


The authors are grateful to the anonymous reviewers for their insightful comments. This work is supported by the National Natural Science Foundation of China under Grants no. 61201317 and no. 61001138.


  1. B. Wang, C. H. Huang, L. Y. Li, and W. Z. Yang, “Trustbased trustbased minimum cost opportunistic routing for Ad Hoc networks,” Journal of Systems and Software, vol. 84, no. 12, pp. 2107–2122, 2011. View at Google Scholar
  2. C. E. Perkins and B. Highly, “Dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” in Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), pp. 234–244, 1994.
  3. D. B. Johnson and D. A. Maltz, “Dynamic source routing in Ad Hoc wireless networks,” Mobile Computing, vol. 353, pp. 153–181, 1996. View at Google Scholar
  4. C. E. Perkins and E. M. Royer, “Ad-Hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, LA, USA, February 1999. View at Publisher · View at Google Scholar · View at Scopus
  5. A. A. Pirzada, A. Datta, and C. S. McDonald, “Trust-based routing for Ad-Hoc wireless networks,” in Proceedings of the 12th IEEE International Conference on Networks (ICON '04), pp. 326–330, November 2004. View at Scopus
  6. H. Xia, Z. P. Jia, X. Li, and F. Zhang, “A subjective trust management model based on AHP for MANETs,” in Proceedings of the International Conference on Network Computing and Information Security (NCIS '11), vol. 1, pp. 363–368, Guilin, China, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. S. C. Peng, W. J. Jia, and G. J. Wang, “Voting-based clustering algorithm with subjective trust and stability in mobile Ad-Hoc networks,” in Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08), vol. 2, pp. 3–9, Shanghai, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “E-hermes: a robust cooperative trust establishment scheme for mobile Ad Hoc networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1156–1168, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Omar, Y. Challal, and A. Bouabdallah, “Reliable and fully distributed trust model for mobile Ad Hoc networks,” Computers and Security, vol. 28, no. 3-4, pp. 199–214, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Xie, J. F. Ma, L. Yang, and X. W. Dong, “A trust method of MANETs based on D-S evidence theory,” International Journal of Advancements in Computing Technology, vol. 4, no. 2, pp. 247–257, 2012. View at Google Scholar
  11. L. D. Huang, G. Xue, X. L. He, and H. L. Zhuang, “A trust model based on evidence theory for P2P systems,” Applied Mechanics and Materials, vol. 20, no. 23, pp. 99–104, 2010. View at Google Scholar · View at Scopus
  12. L. M. Jiang, J. Xu, K. Zhang, and H. Zhang, “A new evidential trust model for open distributed systems,” Expert Systems with Applications, vol. 39, no. 3, pp. 3772–3782, 2012. View at Google Scholar
  13. A. P. Dempster, “Upper and lower probabilities induced by a multi-valued mapping,” The Annals of Mathematical Statistics, vol. 38, no. 2, pp. 325–339, 1967. View at Google Scholar
  14. G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, New Jersey, NJ, USA, 1976.
  15. K. Wang and M. Wu, “Improved secure trust-based location-aided routing model for MANETs,” China Communications, vol. 8, no. 3, pp. 154–162, 2011. View at Google Scholar
  16. X. Li, Z. P. Jia, P. Zhang, and H. Y. Wang, “Trust-based on-demand multipath routing in mobile Ad Hoc networks,” IET Information Security, vol. 4, no. 4, pp. 212–232, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. S. C. Peng, W. J. Jia, G. J. Wang, J. Wu, and M. Y. Guo, “Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks,” IEICE Transactions on Information and Systems, vol. E93.D, no. 3, pp. 510–517, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Narula, S. K. Dhurandher, S. Misra, and I. Woungang, “Security in mobile Ad-Hoc networks using soft encryption and trust-based multi-path routing,” Computer Communications, vol. 31, no. 4, pp. 760–769, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. S. L. F. Sirotheau and R. T. D. Sousa, “Evaluating trust in Ad Hoc network routing by induction of decision trees,” IEEE Latin America Transactions, vol. 10, no. 1, pp. 1332–1343, 2012. View at Google Scholar
  20. A. A. Pirzada, C. McDonald, and A. Datta, “Performance comparison of trust-based reactive routing protocols,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 695–710, 2006. View at Publisher · View at Google Scholar · View at Scopus
  21. A. L. Jousselme, D. Grenier, and E. Bosse, “A new distance between two bodies of evidence,” Information Fusion, vol. 2, no. 2, pp. 91–101, 2001. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Q. Li, M. R. Lyu, and J. C. Liu, “A trust model based routing protocol for secure Ad Hoc networks,” in Proceedings of the IEEE Aerospace Conference Proceedings, vol. 2, pp. 1286–1295, March 2004. View at Scopus