A Dynamic Trust Framework for Opportunistic Mobile Social Networks

Opportunistic mobile social network (OMSN) enables users to form an instant social network for information sharing (e.g., people watching the same soccer game can share their instant comments). OMSN is ad hoc in nature, thus relies on the cooperation of members regarding message transmission. However, some uncooperative or malicious behavior from abnormal members may reduce network performance, even damage the entire network. Currently, there does not exist effective mechanisms to detect selfish and malicious nodes. To tackle this problem, we propose a dynamic trust framework to facilitate a node to derive a trust value of another node based on the behavior of the latter. The novelty of our framework includes the following: 1) we design a new metric for a trust value of a node and 2) we propose a “two–hop feedback method” that requires intermediate nodes in a forwarding path to generate ACK messages to verify a node’s honesty if they are two hops away. In most existing trust models, final ACK messages are considered as critical factors. In OMSN, nodes are not fully connected and final ACK messages cannot be reliably received. In order to avoid the problem that few final ACK messages can be received, we propose a “two–hop feedback method.” Simulation results show that our approach is able to detect a majority of abnormal nodes including malicious nodes, selfish nodes, and those nodes launching conspiracy attacks. Thus, the entire network efficiency can be improved without negative impact of abnormal nodes. Besides, our trust framework can be easily applied to the current popular routing protocols of opportunistic networks.

[1]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[2]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[3]  Marco Conti,et al.  Implementation of CAMEO: A context-aware middleware for Opportunistic Mobile Social Networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[4]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[5]  Xin Wang,et al.  Secure Routing Based on Social Similarity in Opportunistic Networks , 2016, IEEE Transactions on Wireless Communications.

[6]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[7]  John C. S. Lui,et al.  Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation , 2013, IEEE Transactions on Mobile Computing.

[8]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[9]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[10]  S. Sharma,et al.  Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[11]  Ling Liu,et al.  Socialtrust: tamper-resilient trust establishment in online communities , 2008, JCDL '08.

[12]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[13]  Rakesh Ranjan,et al.  Security issues of black hole attacks in MANET , 2015, International Conference on Computing, Communication & Automation.

[14]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[16]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[17]  Thomas Beth,et al.  Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..

[18]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[19]  Kyumin Lee,et al.  SocialTrust++: Building community-based trust in Social Information Systems , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[20]  Munindar P. Singh,et al.  Trust and reputation management in a small-world network , 2000, Proceedings Fourth International Conference on MultiAgent Systems.

[21]  Kun Wang,et al.  Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[22]  Wu Quan-yuan,et al.  Robust Feedback Credibility-Based Distributed P2P Trust Model , 2009 .

[23]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[24]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.