Adaptive leader election method in mobile distributed systems based on dynamic trust integration
DOI:
https://doi.org/10.18372/2073-4751.85.21091Keywords:
distributed systems, FANET, leader election, dynamic trust, Trust-WCA, Trace-Driven SimulationAbstract
The development of mobile distributed systems, particularly Flying Ad-hoc Networks (FANETs), requires a transition to decentralized control architectures involving local leader election. Under hostile conditions, classical additive clustering methods (e.g., Trust-WCA) reveal vulnerabilities to compromised Byzantine nodes (participants that intentionally act destructively while simulating legitimate behavior) exhibiting high radio channel performance. This paper proposes an adaptive leader election method based on a non-linear multiplicative function. The application of a dynamic trust exponent, regulated by an LSTM neural network module depending on the threat level, acts as a filter ("soft gate"), preemptively isolating suspicious nodes. Based on Trace-Driven Simulation results, a relative decrease of 11.6% in the frequency of electing compromised leaders was proven, alongside a simultaneous 0.8% improvement in the network's topological efficiency.
References
Chriki A., Touati H., Snoussi H. FANET: Communication, mobility models and security issues. Computer Networks. 2019. Vol. 163. P. 106877. DOI: 10.1016/j.comnet.2019.106877.
van Steen M., Tanenbaum A. S. Distributed Systems. 4th ed. Maarten van Steen, 2023. 600 p.
Kong L., Chen B., Hu F. LAP-BFT: Lightweight asynchronous provable Byzantine fault-tolerant consensus mechanism for UAV network. Drones. 2022. Vol. 6, No. 8. P. 187. DOI: 10.3390/drones6080187.
Zhang Y., Hu Z., Wang Z. et al. Survivability analysis of unmanned aerial vehicle network based on dynamic weighted clustering algorithm with dual cluster heads. Electronics. 2023. Vol. 12, No. 7. P. 1743. DOI: 10.3390/electronics12071743.
Salem S. M. et al. Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols. IEEE Access. 2025. Vol. 13. P. 11077–11092. DOI: 10.1109/ACCESS.2025.3572619.
Fan C. et al. Performance Evaluation of Blockchain Systems: A Systematic Survey. IEEE Access. 2020. Vol. 8. P. 126927–126950. DOI: 10.1109/ACCESS.2020.3006078.
Wang J. et al. ACBFT: Adaptive chained Byzantine fault-tolerant consensus protocol for UAV ad hoc networks. IEEE Transactions on Vehicular Technology. 2025. Vol. 74, No. 7. P. 11324–11336. DOI: 10.1109/TVT.2025.3548281.
Arafat M. Y., Moh S. Bio-inspired approaches for energy-efficient localization and clustering in UAV networks. IEEE Access. 2019. Vol. 7. P. 16250–16269. DOI: 10.1109/ACCESS.2021.3053605.
Van Houdt G., Mosquera C., Nápoles G. A review on the long short-term memory model. Artificial Intelligence Review. 2020. Vol. 53. P. 5929–5955. DOI: 10.1007/s10462-020-09838-1.
Ullah F. et al. Deep Trust: A Novel Framework for Dynamic Trust and Reputation Management in the Internet of Things (IoT)-Based Networks. IEEE Access. 2024. Vol. 12. P. 87407–87419. DOI: 10.1109/ACCESS.2024.3409273.
Zhang C. et al. Trust Attacks and Defense in the Social Internet of Things: Taxonomy and Simulation-Based Evaluation. Sensors. 2025. Vol. 25, No. 3. P. 7513. DOI: 10.3390/s25247513.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.