ReFIoV: A Novel Reputation Framework for Information-Centric Vehicular Applications

In this paper, a novel reputation framework for information-centric vehicular applications leveraging on machine learning and the artificial immune system (AIS), also known as ReFIoV, is proposed. Specifically, the Bayesian learning and classification allow each node to learn as newly observed data of the behavior of other nodes become available and hence classify these nodes, meanwhile, the k-means clustering algorithm allows us to integrate recommendations from other nodes even if they behave in an unpredictable manner. The AIS is used to enhance misbehavior detection. The proposed ReFIoV can be implemented in a distributed manner as each node decides with whom to interact. It provides incentives for nodes to cache and forward others’ mobile data as well as achieves robustness against false accusations and praise. The performance evaluation shows that ReFIoV outperforms state-of-the-art reputation systems for the metrics considered. That is, it presents a very low number of misbehaving nodes incorrectly classified in comparison with another reputation scheme. The proposed AIS mechanism presents a low overhead. The incorporation of recommendations enabled the framework to reduce even further detection time.

[1]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[2]  Liang Zhou,et al.  Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..

[3]  Lorenzo Bracciale,et al.  CRAWDAD dataset roma/taxi (v.2014-07-17) , 2014 .

[4]  A. C. Davison,et al.  Statistical models: Name Index , 2003 .

[5]  Naércio Magaia,et al.  Nodes' misbehavior in Vehicular Delay-Tolerant Networks , 2013, 2013 Conference on Future Internet Communications (CFIC).

[6]  Feng Xia,et al.  A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.

[7]  Greg Bigwood,et al.  IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[8]  Jean-Marie Bonnin,et al.  Routing protocols in Vehicular Delay Tolerant Networks: A comprehensive survey , 2014, Comput. Commun..

[9]  Dario Rossi,et al.  Analyzing cacheable traffic in isp access networks for micro cdn applications via content-centric networking , 2014, ICN '14.

[10]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[11]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[12]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[13]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[14]  Joan Triay,et al.  From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks , 2012, IEEE Communications Surveys & Tutorials.

[15]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[16]  Gianluca Dini,et al.  Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.

[17]  Kazi Ashrafuzzaman,et al.  Performance measurement of different backoff algorithms in IEEE 802.15.4 , 2016, 2016 International Conference on Innovations in Science, Engineering and Technology (ICISET).

[18]  Miguel Correia,et al.  REPSYS: A Robust and Distributed Incentive Scheme for Collaborative Caching and Dissemination in Content-Centric Cellular-Based Vehicular Delay-Tolerant Networks , 2018, IEEE Wireless Communications.

[19]  Greg Hamerly,et al.  Alternatives to the k-means algorithm that find better clusterings , 2002, CIKM '02.

[20]  Zhenfu Cao,et al.  SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs , 2013, Ad Hoc Sens. Wirel. Networks.

[21]  Naércio Magaia,et al.  Selfish and malicious behavior in Delay-Tolerant Networks , 2013, 2013 Future Network & Mobile Summit.

[22]  Sheng Chen,et al.  Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks , 2016, IEEE Transactions on Mobile Computing.

[23]  Cecilia Mascolo,et al.  CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks , 2009, IEEE Transactions on Mobile Computing.

[24]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[25]  Miguel Correia,et al.  Betweenness centrality in Delay Tolerant Networks: A survey , 2015, Ad Hoc Networks.

[26]  Gennaro Boggia,et al.  Information-Centric Networking: Baseline Scenarios , 2015, RFC.

[27]  Xin Wang,et al.  Secure Routing Based on Social Similarity in Opportunistic Networks , 2016, IEEE Transactions on Wireless Communications.

[28]  Miguel Correia,et al.  ePRIVO: An Enhanced PRIvacy-preserVing Opportunistic Routing Protocol for Vehicular Delay-Tolerant Networks , 2018, IEEE Transactions on Vehicular Technology.

[29]  Zhenfu Cao,et al.  MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[30]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[31]  Miguel Correia,et al.  REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks , 2017, MSWiM.

[32]  Paulo Rogerio Pereira,et al.  Security in Delay-Tolerant Mobile Cyber-Physical Applications , 2015 .

[33]  Li Li,et al.  A secure routing based on social trust in opportunistic networks , 2016, 2016 IEEE International Conference on Communication Systems (ICCS).