Autoregressive Trust Management in Wireless Ad Hoc Networks

In this paper, we propose a novel trust management scheme for improving routing reliability in wireless ad hoc networks. It is grounded on two classic autoregression models, namely Autoregressive (AR) model and Autoregressive with exogenous inputs (ARX) model. According to this scheme, a node periodically measures the packet forwarding ratio of its every neighbor as the trust observation about that neighbor. These measurements constitute a time series of data. The node has such a time series for each neighbor. By applying an autoregression model to these time series, it predicts the neighbors future packet forwarding ratios as their trust estimates, which in turn facilitate it to make intelligent routing decisions. With an AR model being applied, the node only uses its own observations for prediction; with an ARX model, it will also take into account recommendations from other neighbors. We evaluate the performance of the scheme when AR, ARX or a previously proposed Bayesian model is used. Simulation results indicate that the ARX model is the best choice in terms of accuracy.

[1]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[2]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[4]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[5]  Vijay Varadharajan,et al.  Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.

[6]  Jiming Chen,et al.  Toward Reliable Actor Services in Wireless Sensor and Actor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[7]  Ivan Stojmenovic,et al.  Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage , 2011, IEEE Transactions on Mobile Computing.

[8]  Xu Li,et al.  Mobility Prediction Based Neighborhood Discovery in Mobile Ad Hoc Networks , 2011, Networking.

[9]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Petre Stoica,et al.  Least-squares, Yule-Walker, and overdetermined Yule—Walker estimation of AR parameters: a Monte Carlo analysis of finite-sample properties , 1986 .

[11]  Gregory G. Finn,et al.  Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report. , 1987 .

[12]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[13]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[14]  Jian-ping Qiu,et al.  Trust Management for Semantec Web , 2008, 2008 International Conference on Computer Science and Software Engineering.

[15]  P. Young,et al.  Time series analysis, forecasting and control , 1972, IEEE Transactions on Automatic Control.

[16]  Weihua Zhuang,et al.  Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks , 2012, 2012 Proceedings IEEE INFOCOM.

[17]  H. Akaike A new look at the statistical model identification , 1974 .

[18]  Xiaohui Liang,et al.  SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[19]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[20]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[21]  Eric R. Ziegel,et al.  Engineering Statistics , 2004, Technometrics.

[22]  Jinshu Su,et al.  A reputation inference model based on linear hidden markov process , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[23]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[24]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[25]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[26]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[27]  Joel Weise-Sunps,et al.  Public Key Infrastructure Overview , 2001 .