Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks

With the proliferation of fairly powerful mobile devices and ubiquitous wireless technology, we see a transformation from traditional mobile ad hoc networks (MANETs) into a new era of service-oriented MANETs wherein a node can provide and receive services. Requested services must be decomposed into more abstract services and then bound; we formulate this as a multi-objective optimization (MOO) problem to minimize the service cost, while maximizing the quality of service and quality of information in the service a user receives. The MOO problem is an SP-to-service assignment problem. We propose a multidimensional trust based algorithm to solve the problem. We carry out an extensive suite of simulations to test the relative performance of the proposed trust-based algorithm against a non-trust-based counterpart and an existing single-trust-based beta reputation scheme. Our proposed algorithm effectively filters out malicious nodes exhibiting various attack behaviors by penalizing them with loss of reputation, which ultimately leads to high user satisfaction. Further, our proposed algorithm is efficient with linear runtime complexity while achieving a close-to-optimal solution.

[1]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[2]  Edward W. Knightly,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[3]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[4]  Benjamin Klöpper,et al.  Towards robust service compositions in the context of functionally diverse services , 2012, WWW.

[5]  Ananthram Swami,et al.  Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[6]  Christian Glaßer,et al.  Approximability and Hardness in Multi-objective Optimization , 2010, CiE.

[7]  Niranjan Suri Dynamic service-oriented architectures for tactical edge networks , 2009, WEWST '09.

[8]  Nizar Bouguila,et al.  QoS-Based Reputation Feedback Fusion under Unknown Correlation , 2014, ICAIS.

[9]  Anupam Joshi,et al.  A distributed service composition protocol for pervasive environments , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[10]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[11]  Fei Tao,et al.  Resource Service Composition and Its Optimal-Selection Based on Particle Swarm Optimization in Manufacturing Grid System , 2008, IEEE Transactions on Industrial Informatics.

[12]  Yong Wang,et al.  Trust-Aware Component Service Selection Algorithm in Service Composition , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.

[13]  Munindar P. Singh Trustworthy Service Composition: Challenges and Research Questions , 2002, Trust, Reputation, and Security.

[14]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[15]  Sokol Kosta,et al.  Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[16]  Jin-Hee Cho,et al.  Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[17]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[18]  Carlo Ghezzi,et al.  Optimizing Service Selection and Allocation in Situational Computing Applications , 2013, IEEE Transactions on Services Computing.

[19]  M. B. Blake,et al.  Trust-based Dynamic Web service Composition using Social Network Analysis , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).

[20]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[21]  Boleslaw K. Szymanski,et al.  A Model-Driven Approach to the Construction, Composition and Analysis of Services on Sensor Networks , 2010 .

[22]  Anja Strunk QoS-Aware Service Composition: A Survey , 2010, 2010 Eighth IEEE European Conference on Web Services.

[23]  Anne H. H. Ngu,et al.  QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.

[24]  Thomas Risse,et al.  Combining global optimization with local selection for efficient QoS-aware service composition , 2009, WWW '09.

[25]  Ray-Yuan Sheu,et al.  Real-time Multi-agent Adaptive Tactical Pervasive Service-Oriented Collaborations (TAPS) , 2010 .

[26]  Ping Sun Service Composition and Optimal Selection with Trust Constraints , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[27]  Munindar P. Singh,et al.  Trustworthy Service Selection and Composition , 2011, TAAS.

[28]  Mohan Kumar,et al.  Dynamic Service Composition in Pervasive Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[29]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[30]  Nizar Bouguila,et al.  Correlated multi-dimensional qos metrics for trust evaluation within web services , 2014, AAMAS.

[31]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[32]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[33]  Amiya Nayak,et al.  A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition , 2012, IEEE Transactions on Parallel and Distributed Systems.

[34]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[35]  F.T. Johnsen,et al.  Pervasive service discovery across heterogeneous tactical networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[36]  Munindar P. Singh,et al.  Behind the Curtain: Service Selection via Trust in Composite Services , 2012, 2012 IEEE 19th International Conference on Web Services.

[37]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.

[38]  Zhe Zhang,et al.  Shin: Generalized Trust Propagation with Limited Evidence , 2013, Computer.

[39]  Frank T. Johnsen,et al.  Semantic Service Discovery for Interoperability in Tactical Military Networks , 2010 .

[40]  Jamal Bentahar,et al.  A survey on trust and reputation models for Web services: Single, composite, and communities , 2015, Decis. Support Syst..

[41]  Nizar Bouguila,et al.  Probabilistic approach for QoS-aware recommender system for trustworthy web service selection , 2014, Applied Intelligence.

[42]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[43]  Tao Yu,et al.  Efficient algorithms for Web services selection with end-to-end QoS constraints , 2007, TWEB.

[44]  Tucker R. Balch,et al.  A Generic Framework for Distributed Multirobot Cooperation , 2011, J. Intell. Robotic Syst..

[45]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[46]  Jana Koehler,et al.  Web Service Composition - Current Solutions and Open Problems , 2003 .

[47]  Xiaomeng Su,et al.  A Survey of Automated Web Service Composition Methods , 2004, SWSWPC.

[48]  Shouhuai Xu,et al.  Enhancing Data Trustworthiness via Assured Digital Signing , 2012, IEEE Transactions on Dependable and Secure Computing.

[49]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[50]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[51]  Tao Yu,et al.  A broker-based framework for QoS-aware Web service composition , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[52]  Jamal Bentahar,et al.  Analyzing the Relationships between some Parameters of Web Services Reputation , 2010, 2010 IEEE International Conference on Web Services.