A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks

This chapter presents a novel trust model called Multi-Parameter Trust Framework for Mobile ad hoc networks (MTFM). A key feature of this proposed framework is its use of multiple rather than a single parameter to decide the resulting trust value, applying Grey theory. Results presented here demonstrate that the new framework can maintain consistent trust values in the presence of various types of mobility. Simulations conducted in an 802.11-based mobile ad hoc network also show that this framework offers good robustness in misbehaviour detection by employing multiple parameters. The detection capability of the new framework is examined for a range of misbehaviours and its performance is compared to existing single-parameter approaches, such as the Beta distribution method. Ji Guo Queen’s University Belfast, UK Alan Marshall Queen’s University Belfast, UK Bosheng Zhou Queen’s University Belfast, UK

[1]  Peng Liu,et al.  An Objective Trust Management Framework for Mobile Ad Hoc Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[2]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[3]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[4]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[5]  Ji Guo,et al.  A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory , 2011, IFIPTM.

[6]  María Teresa Lamata,et al.  Consistency in the Analytic Hierarchy Process: a New Approach , 2006, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Baoyi Wang,et al.  A Novel Grid Trust Model Based on Fuzzy Theory , 2009, 2009 Third International Conference on Network and System Security.

[8]  Yi Chen,et al.  A Fuzzy Trust Evaluation Based Access Control in Grid Environment , 2008, The Third ChinaGrid Annual Conference (chinagrid 2008).

[9]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Konstantinos G. Kyriakopoulos,et al.  An on-line wireless attack detection system using multi-layer data fusion , 2011, 2011 IEEE International Workshop on Measurements and Networking Proceedings (M&N).

[11]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[12]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[13]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[14]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[15]  Mowafa Househ,et al.  Social Media and Mobile Technologies for Healthcare , 2014 .

[16]  Leonie Ellis,et al.  The Past, the Present, and the Future: Examining the Role of the “Social” in Transforming Personal Healthcare Management of Chronic Disease , 2014 .

[17]  ABBAS JAMALIPOUR,et al.  Network selection in an integrated wireless LAN and UMTS environment using mathematical modeling and computing techniques , 2005, IEEE Wireless Communications.

[18]  Dhananjay Singh,et al.  Design and Performance Evaluation of a Proactive Micro Mobility Protocol for Mobile Networks , 2010 .

[19]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[20]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[21]  J. Deng,et al.  Introduction to Grey system theory , 1989 .

[22]  Trinh Anh Tuan A Game-Theoretic Analysis of Trust Management in P2P Systems , 2006, 2006 First International Conference on Communications and Electronics.

[23]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[24]  W. Poortinga,et al.  Trust, the Asymmetry Principle, and the Role of Prior Beliefs , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[25]  Thomas L. Saaty,et al.  DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .

[26]  Junzhou Luo,et al.  A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[27]  Liu Chen,et al.  Notice of RetractionA Subjective Trust Model Based on Two-Dimensional Measurement , 2009, 2009 International Conference on Computer Engineering and Technology.

[28]  Tao Limin,et al.  Research of subjective trust comprehensive evaluation model based on multi-element connection number , 2010, The 2nd International Conference on Information Science and Engineering.

[29]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[30]  Liu Ming,et al.  Grey Theory Based Nodes Risk Assessment in P2P Networks , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[31]  Zhiping Jia,et al.  Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.

[32]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[33]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[34]  Jerzy Konorski,et al.  Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[35]  Richa Singh,et al.  Dempster-Shafer Theory Based Classifier Fusion for Improved Fingerprint Verification Performance , 2006, ICVGIP.

[36]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[37]  Morris Sloman,et al.  Specifying and Analysing Trust for Internet Applications , 2002, I3E.

[38]  Coye Cheshire,et al.  The Emergence of Trust Networks under Uncertainty – Implications for Internet Interactions , 2004 .