Trust management in mobile ad hoc networks for bias minimization and application performance maximization

Abstract Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximization. By means of a novel model-based approach to model the ground truth status of mobile nodes in MANETs as the basis for design validation, we identify and validate the best trust protocol settings under which trust bias is minimized and application performance is maximized. We demonstrate the effectiveness of our approach with an integrated social and quality-of-service (QoS) trust protocol (called SQTrust) with which we identify the best trust aggregation setting under which trust bias is minimized despite the presence of malicious nodes performing slandering attacks. Furthermore, using a mission-oriented mobile group utilizing SQTrust, we identity the best trust formation protocol setting under which the application performance in terms of the system reliability of the mission-oriented mobile group is maximized.

[1]  Ananthram Swami,et al.  A Provenance-Based Trust Model for Delay Tolerant Networks , 2012, IFIPTM.

[2]  Jin-Hee Cho,et al.  Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[3]  Ing-Ray Chen,et al.  Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers , 1998, Perform. Evaluation.

[4]  Licia Capra,et al.  Autonomic trust prediction for pervasive systems , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[5]  Stefanos Gritzalis,et al.  Trust Establishment in Ad Hoc and Sensor Networks , 2006, CRITIS.

[6]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Sheng-Tzong Cheng,et al.  Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.

[8]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[9]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[10]  Jin-Hee Cho,et al.  Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.

[11]  Ing-Ray Chen,et al.  Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..

[12]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[13]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[14]  Malik Magdon-Ismail,et al.  Simulating the Diffusion of Information: An Agent-Based Modeling Approach , 2010, Int. J. Agent Technol. Syst..

[15]  Svein J. Knapskog,et al.  TSR: trust-based secure MANET routing using HMMs , 2008, Q2SWinet '08.

[16]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[18]  Pang-Ning Tan,et al.  Local detection of selfish routing behavior in ad hoc networks , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[19]  Farokh B. Bastani,et al.  Effect of artificial-intelligence planning-procedures on system reliability , 1991 .

[20]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[21]  Ananthram Swami,et al.  Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[22]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[23]  Amiya Nayak,et al.  A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition , 2012, IEEE Transactions on Parallel and Distributed Systems.

[24]  Thomas F. La Porta,et al.  On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.

[25]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[26]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[27]  Farokh B. Bastani,et al.  Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).

[28]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[29]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[30]  Ing-Ray Chen,et al.  Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.

[31]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[32]  Ing-Ray Chen,et al.  Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..

[33]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[34]  Ing-Ray Chen,et al.  Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[35]  I. Sengupta,et al.  A Distributed Trust Mechanism for Mobile Ad Hoc Networks , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[36]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[37]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[38]  Ing-Ray Chen,et al.  Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..

[39]  Ing-Ray Chen,et al.  Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..

[40]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[41]  Jennifer Golbeck,et al.  Computing with Trust: Definition, Properties, and Algorithms , 2006, 2006 Securecomm and Workshops.

[42]  L. Bengtsson,et al.  Lookup Table Optimization for Sensor Linearization in Small Embedded Systems , 2012 .

[43]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[44]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[45]  Brijesh Kumar Chaurasia,et al.  Trust Management Model for Wireless Ad Hoc Networks , 2011, SocProS.

[46]  Kishor S. Trivedi,et al.  Performance and Reliability Analysis of Computer Systems , 1996, Springer US.

[47]  Ing-Ray Chen,et al.  Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..

[48]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[49]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[50]  Ing-Ray Chen,et al.  Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..

[51]  Farokh B. Bastani,et al.  On the Reliability of AI Planning Software in Real-Time Applications , 1995, IEEE Trans. Knowl. Data Eng..

[52]  Ing-Ray Chen,et al.  Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.

[53]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[54]  William Joseph Adams,et al.  Validating a Trust-based Access Control System , 2007, IFIPTM.

[55]  John D. Musa,et al.  Operational profiles in software-reliability engineering , 1993, IEEE Software.

[56]  Jia Guo,et al.  Integrated social and quality of service trust management of mobile groups in ad hoc networks , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.

[57]  Munindar P. Singh,et al.  Trustworthy Service Selection and Composition , 2011, TAAS.

[58]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[59]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[60]  Vijay Varadharajan,et al.  Trust and Recommendations in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).

[61]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[62]  Ing-Ray Chen,et al.  Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..

[63]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[64]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.

[65]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[66]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[67]  Mrs. A. Sangeetha,et al.  REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .

[68]  Brian L. Mark,et al.  Robust cooperative trust establishment for MANETs , 2006, SASN '06.

[69]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[70]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[71]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[72]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[73]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[74]  Jin-Hee Cho,et al.  On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.

[75]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.