Hierarchical trust management of community of interest groups in mobile ad hoc networks

In mission-critical applications deployed in mobile ad hoc networks, very frequently a commander will need to assemble and dynamically manage Community of Interest (COI) mobile groups to achieve the mission assigned despite failure, disconnection or compromise of COI members. In this paper, we present a dynamic hierarchical trust management protocol that can learn from past experiences and adapt to changing environment conditions (e.g., increasing misbehaving node population, evolving hostility and node density, etc.) to enhance agility and maximize application performance. With trust-based misbehaving node detection as an application, we demonstrate how our proposed COI trust management protocol is resilient to node failure, disconnection and capture events, and can help maximize application performance in terms of minimizing false negatives and positives in the presence of mobile nodes exhibiting vastly distinct QoS and social behaviors.

[1]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[2]  Ing-Ray Chen,et al.  Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Sokol Kosta,et al.  Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[5]  Ing-Ray Chen,et al.  Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..

[6]  Mrs. A. Sangeetha,et al.  REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .

[7]  Stathes Hadjiefthymiades,et al.  Trust management in mobile ad hoc networks , 2014, 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks).

[8]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Sheng-Tzong Cheng,et al.  Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.

[11]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[12]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[13]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[14]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[15]  Jin-Hee Cho,et al.  Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks , 2011, Perform. Evaluation.

[16]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[17]  Ing-Ray Chen,et al.  Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..

[18]  Jin-Hee Cho,et al.  Performance optimization of region-based group key management in mobile ad hoc networks , 2008, Perform. Evaluation.

[19]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[20]  Ing-Ray Chen,et al.  Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.

[21]  Jin-Hee Cho,et al.  Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[22]  Mingchu Li,et al.  ServiceTrust: Trust Management in Service Provision Networks , 2013, 2013 IEEE International Conference on Services Computing.

[23]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[24]  Vijay Varadharajan,et al.  A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.

[25]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[26]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[27]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[28]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[29]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[30]  David M. Nicol,et al.  A calculus of trust and its application to PKI and identity management , 2009, IDtrust '09.

[31]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[32]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[33]  Ing-Ray Chen,et al.  Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..

[34]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[35]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[36]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[37]  Muthucumaru Maheswaran,et al.  Towards a Gravity-Based Trust Model for Social Networking Systems , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[38]  Qinghua Li,et al.  Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[39]  Ing-Ray Chen,et al.  Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..

[40]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.