Trust management in mobile ad hoc networks using a scalable maturity-based model

In this paper, we propose a human-based model which builds a trust relationship between nodes in an ad hoc network. The trust is based on previous individual experiences and on the recommendations of others. We present the Recommendation Exchange Protocol (REP) which allows nodes to exchange recommendations about their neighbors. Our proposal does not require disseminating the trust information over the entire network. Instead, nodes only need to keep and exchange trust information about nodes within the radio range. Without the need for a global trust knowledge, our proposal scales well for large networks while still reducing the number of exchanged messages and therefore the energy consumption. In addition, we mitigate the effect of colluding attacks composed of liars in the network. A key concept we introduce is the relationship maturity, which allows nodes to improve the efficiency of the proposed model for mobile scenarios. We show the correctness of our model in a single-hop network through simulations. We also extend the analysis to mobile multihop networks, showing the benefits of the maturity relationship concept. We evaluate the impact of malicious nodes that send false recommendations to degrade the efficiency of the trust model. At last, we analyze the performance of the REP protocol and show its scalability. We show that our implementation of REP can significantly reduce the number messages.

[1]  Raouf Boutaba,et al.  Topology and mobility considerations in mobile ad hoc networks , 2005, Ad Hoc Networks.

[2]  George Ghinea,et al.  Trust model for certificate revocation in ad hoc networks , 2008, Ad Hoc Networks.

[3]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[4]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  Feniosky Peña-Mora,et al.  A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations , 2008, Adv. Eng. Informatics.

[6]  Jon Crowcroft,et al.  Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.

[7]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[8]  Jianping Pan,et al.  Identity-based secure collaboration in wireless ad hoc networks , 2007, Comput. Networks.

[9]  Otto Carlos Muniz Bandeira Duarte,et al.  A Trust Model Robust to Slander Attacks in Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[10]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[11]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[12]  Otto Carlos Muniz Bandeira Duarte,et al.  Analyzing a human-based trust model for mobile ad hoc networks , 2008, 2008 IEEE Symposium on Computers and Communications.

[13]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[15]  Jamal N. Al-Karaki,et al.  Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..

[16]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[17]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  Otto Carlos Muniz Bandeira Duarte,et al.  An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks , 2009, IEEE INFOCOM 2009.

[20]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[22]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[23]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[24]  George Pavlou,et al.  A programmable framework for the deployment of services and protocols in mobile ad hoc networks , 2007, IEEE Transactions on Network and Service Management.

[25]  David D. Clark,et al.  A knowledge plane for the internet , 2003, SIGCOMM '03.

[26]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[27]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[28]  Marcelo G. Rubinstein,et al.  Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks , 2008, Ann. des Télécommunications.

[29]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[30]  Lora Aroyo,et al.  Trust and Reputation in Social Internetworking Systems , 2022 .

[31]  K. Komathy,et al.  Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..

[32]  Guy Pujolle,et al.  A distributed information repository for autonomic context-aware MANETs , 2009, IEEE Transactions on Network and Service Management.

[33]  Otto Carlos Muniz Bandeira Duarte,et al.  HIT: A Human-Inspired Trust Model , 2006, MWCN.

[34]  Qi He,et al.  A secure incentive architecture for ad hoc networks , 2006, Wirel. Commun. Mob. Comput..