FROST: Friendship and Ordered Semirings Based Trust System for Securing Wireless Distributed Networks

In wireless distributed networks, reputation system plays an important role in giving distributed entities incentives to cooperate in packet forwarding. However, reputation system itself is vulnerable to attack and the reputation of entities in networks can be manipulated intentionally by malicious ones. In a previous work, Theodorakopoulos and Baras [1] develop a novel formulation of trust computation based on ordered semirings. In this paper, we adapt their ordered semirings based approach to support group trust calculation accuracy. In addition and more importantly, we use friendship model with trust fusion to decrease the overhead while maintaining the trust system. As far as we know, this is the first time notion—trust fusion is introduced in this research field. Moreover, we develop a more efficient decaying model to enable the reputation system to be more adaptive to the changing environment. Particularly, the newly proposed reputations system is employed in fully wireless distributed mobile ad hoc networks. Through theoretical analysis and emperimental results, we demonstrate that our adaptive FRiendship and Ordered Semirings based Trust system (FROST) has a good performance and can quantitatively measure reputation and defend reputation system against malicious attacks.

[1]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[2]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[4]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[5]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[6]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[7]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[8]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[9]  Shanshan Li,et al.  A Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks , 2011, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks.

[10]  Junhao Wen,et al.  Web Service Selection Mechanism with QoS and Trust Management , 2011 .

[11]  Ruidong Li,et al.  On-demand public-key management for mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[13]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[14]  G. Rote Path Problems in Graphs , 1990 .

[15]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[16]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[19]  Chrysanthos Dellarocas,et al.  Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.

[20]  M. Demir,et al.  I am so Happy ’Cause Today I Found My Friend: Friendship and Personality as Predictors of Happiness , 2007 .

[21]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[22]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[23]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.