Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks

In this paper, we present a trust model to evaluate the trustworthiness of information as well as the information publishing nodes based on the information provenance. We consider two factors in evaluating the provenance-based information trust: Path Similarity and Information Similarity. In multihop networks, information can flow through multiple hops from multiple paths. We model the similarity between different paths which deliver information about the same event and the similarity between two information items about the same event which are delivered through different paths. Both path and information similarity factors are considered in determining the trust of the information. This information trust is indeed used as a feedback factor to adaptively adjust trust of the nodes in the network. Detailed analysis of the proposed approach is presented along with simulation results for validation.

[1]  Annett Laube,et al.  Trustworthiness Assessment of Wireless Sensor Data for Business Applications , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[2]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[3]  Vipin Kumar,et al.  Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.

[4]  John S. Baras,et al.  Trust Evaluation in Anarchy: A Case Study on Autonomous Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Sungyoung Lee,et al.  Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[6]  Bin Yu,et al.  A Demspter-Shafer approach to provenance-aware trust assessment , 2008, 2008 International Symposium on Collaborative Technologies and Systems.

[7]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[8]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[9]  Margaret Martonosi,et al.  Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.

[10]  Tasos Dagiuklas,et al.  Dynamic trust establishment in emergency ad hoc networks , 2009, IWCMC.

[11]  Mohan Kumar,et al.  DTT: A Distributed Trust Toolkit for pervasive systems , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[12]  Hans-Jörg Schek,et al.  A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces , 1998, VLDB.