Reliability estimation in mobile ad hoc networks

We describe a system for estimating the reliability of nodes in a mobile ad hoc network. The goal of the system is to detect insider attacks on the control plane of wireless protocols at the link and network layers, and to generate and propagate corresponding reliability estimates for nodes across the network. Our contributions are two-fold: first, we implement a cross-layer invariant-based technique for attack detection, where rules about correct combined behavior of protocols are specified based on data collected from multiple layers of the protocol stack. Next, we use the results of our attack detection techniques to compute reliability estimates for network nodes, where a reliability estimate represents the estimate of a node N for another node M. The form of our reliability estimate for a node is expressed as (t, c), where t indicates the trust for that node, and c indicates the confidence in this trust value. Reliability estimates are propagated across the network in a manner that is resilient to malicious nodes that propagate false reliability estimates, and minimizes network overheads. Our simulation results show that the above techniques result in highly accurate reliability estimates even in the presence of multiple malicious nodes in the network.

[1]  Audun Jøsang,et al.  Trust Transitivity and Conditional Belief Reasoning , 2012, IFIPTM.

[2]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[3]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[4]  Simon N. Foley,et al.  Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System , 2010, STM.

[5]  Georgios Efthymios Theodorakopoulos,et al.  Robust Network Trust Establishment for Collaborative Applications and Protocols , 2007 .

[6]  F. Cuppens,et al.  Property Based Intrusion Detection to Secure OLSR , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[7]  Rolf Haenni,et al.  A New Approach to PGP's Web of Trust , 2007 .

[8]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[9]  Lise Getoor,et al.  Probabilistic soft logic for trust analysis in social networks , 2012 .

[10]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[11]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  David M. Nicol,et al.  A calculus of trust and its application to PKI and identity management , 2009, IDtrust '09.

[14]  Mehryar Mohri,et al.  Semiring Frameworks and Algorithms for Shortest-Distance Problems , 2002, J. Autom. Lang. Comb..

[15]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[16]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[17]  Ariel D. Procaccia,et al.  Gossip-based aggregation of trust in decentralized reputation systems , 2007, Autonomous Agents and Multi-Agent Systems.