TEEM: Trust-based Energy-Efficient Distributed
Monitoring for Mobile Ad-hoc Networks
Andrea Lupia
*
, Chaker Abdelaziz Kerrache
†
, Floriano De Rango
*
,
Carlos T. Calafate
‡
, Juan-Carlos Cano
‡
,Pietro Manzoni
‡
*
DIMES Dept., University of Calabria
Rende (CS), Italy
{alupia, derango}@dimes.unical.it
†
Laboratoire d’Informatique et de Math´ ematiques, University of Laghouat
BP 37G, route de Ghardaia, Laghouat, Algeria
a.kerrache@mail.lagh-univ.dz
‡
Department of Computer Engineering, Universitat Polit` ecnica de Val` encia
Camino de Vera, S/N, Valencia, Spain
{calafate, jucano, pmanzoni}@disca.upv.es
Abstract—Detecting malicious and selfish nodes in mobile and
wireless networks is a task that typically relies on watchdog
techniques. However, such medium overhearing techniques are
prone to cause a high energy consumption. In this paper we
propose a distributed time division-based monitoring strategy
to achieve the high security levels required while consuming less
energy. Our proposal involves both trust and link duration among
honest peers to fairly divide the monitoring period, and takes
advantage of the periodically exchanged hello messages to make
this solution fully distributed. Simulations results evidence our
proposal energy efficiency, especially for high density scenarios
(>100 nodes) where the consumption became stable and does not
increase with the number of nodes (<4300 W·s), while ensuring
high detection ratios of malicious nodes (>90%).
Index Terms—Distributed monitoring; Trust; Energy
consumption; MANET.
I. I NTRODUCTION
Solutions ensuring secure and reliable communication
are typically classified into two main categories:
cryptography-based, which mostly introduce a high
computational delay, and trust-based solutions, that allow
evaluating past interactions with less computational effort.
The latter are more adapted to mobile and energy-restricted
networks because they have lower computational requirements
compared to the former, and so they are adopted as trust
management solutions in different kinds of networks
including Mobile Ad-hoc Networks (MANETs) [1] and
Vehicular Ad-hoc Networks (VANETs) [2], being able to
ensure high security levels with reduced computational
requirements. However, despite they reduce the energy
related to computation, the consumption associated to the
communications interface remains the same.
To overcome the aforementioned problems, and to find
a proper trade-off between security levels and energy
consumption, in this paper we propose a distributed trust-based
monitoring solution able to face both malicious and selfish
nodes while supporting node sleeping. Our proposal first
combines trust evaluation and link duration to select the most
trusted and stable neighbors in the neighborhood. Afterward,
nodes trusting each other will mutually synchronize in a
distributed manner, and agree on the monitoring schedule for
their neighborhood; this is achieved through some additional
fields appended to periodic ’Hello’ messages. With this
technique the energy consumption is significantly reduced,
meaning that the more trusted neighbors a node has, the less
time it needs to dedicate to network monitoring tasks, thereby
extending its lifetime. It is worth mentioning that our solution
is independent and can be implemented over any routing
protocol; in particular, for this work, we chose to implement
it over the well-known Ad-hoc On-demand Distance Vector
(AODV) routing protocol [3].
Obtained simulation results using the NS-3 simulator show
that our distributed monitoring technique significantly reduces
the energy consumption by more than 50%, without affecting
the detection performances (>90%).
The rest of the paper is organized as follows: Section II
details how trust and link duration can be computed and
combined together in order to select the most trusted and stable
neighbors with whom the monitoring period will be shared.
We explain the distributed monitoring process in Section III,
and we then evaluate its performance in Section IV. Finally,
Section V concludes the paper.
II. TRUST AND LINK DURATION COMPUTATION
A node j is considered companion of another node i if
node j has a high trust value from the perspective of i, and
the communications between them are mostly stable.
Therefore, a node j is included in the companions table
only if its Companion Score (CS) is higher than a predefined
threshold; this node will be also removed from the table once
its CS(i, j ) value goes below the same predefined threshold.
To compute CS we use the following equation:
CS(i, j )=(α · T
i,j
) + [(1 - α) · LSI(i, j )] (1)
978-1-5090-5856-3/17/$31.00 ©2017 IEEE 133