LogitTrust : A Logit Regression-based Trust Model for Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) have been utilized to execute many applications in diverse environments. Trust is an effective mechanism to cope with misbehaving nodes. However, implementing trust in MANETs is confronted by several obstacles, i.e., no centralized authority, dynamic environments, and limited observations which hinder trust accuracy. In this work, we propose a novel logit regressionbased trust model called LogitTrust to model dynamic trust for service-oriented MANETs wherein a node can be a service requester (SR) or a service provider (SP). The novelty of our design lies in the use of logit regression to dynamically estimate trust of SPs based on their distinct behavior patterns in response to environment changes. We demonstrate that LogitTrust outperforms traditional approaches based on Bayesian Inference with belief discounting in terms of trust accuracy and resiliency against attacks, when given the same amount of limited observations, while maintaining a low false positive rate.

[1]  Jeremy MG Taylor,et al.  Robust Statistical Modeling Using the t Distribution , 1989 .

[2]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[3]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[4]  Chuanhai Liu Robit Regression: A Simple Robust Alternative to Logistic and Probit Regression , 2005 .

[5]  Jin-Long Wang,et al.  Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks , 2007, KES.

[6]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[7]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[8]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Zhiping Jia,et al.  Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..

[10]  Cédric Archambeau,et al.  Probabilistic models in noisy environments : and their application to a visual prosthesis for the blind/ , 2005 .

[11]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[12]  T. Rama Rao,et al.  Regression-based trust model for mobile ad hoc networks , 2012, IET Inf. Secur..

[13]  Jia Guo,et al.  Trust management in mobile ad hoc networks for bias minimization and application performance maximization , 2014, Ad Hoc Networks.

[14]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[15]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[16]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[17]  X. Hu Generalized Linear Models , 2003 .

[18]  Ivan Stojmenovic,et al.  Autoregression Models for Trust Management in Wireless Ad Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[19]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[20]  Stefanos Gritzalis,et al.  Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[21]  Hai Le Vu,et al.  MAC Access Delay of IEEE 802.11 DCF , 2007, IEEE Transactions on Wireless Communications.

[22]  Ananthram Swami,et al.  Trust and independence aware decision fusion in distributed networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[23]  Lei Guo,et al.  Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.

[24]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[25]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[26]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[27]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[28]  Christophe Diot,et al.  CRAWDAD dataset thlab/sigcomm2009 (v.2012-07-15) , 2012 .

[29]  Wei Cheng,et al.  ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.