Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Proposal by CA Technologies, IBM, SAP, Vnomic
- Paper By Yunfeng Lin, Baochun Li, Ben Liang. Outline Motivation Constraints in DTN Network coding Vs Replication Binary Spraying Vs Epidemic routing.
Integer linear programming Optimization problems where design variables have to be integers are more difficult than ones with continuous variables. The.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
On Fairness, Optimizing Replica Selection in Data Grids Husni Hamad E. AL-Mistarihi and Chan Huah Yong IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
Query Planning for Searching Inter- Dependent Deep-Web Databases Fan Wang 1, Gagan Agrawal 1, Ruoming Jin 2 1 Department of Computer.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
QOS Routing: The Precomputation Perspective Ariel Orda and Alexander Sprintson Presented by: Jing, Niloufer, Tri.
Computer Science and Engineering 1 Mobile Computing and Security.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Optimizing server placement in distributed systems in the presence of competition Jan-Jan Wu( 吳真貞 ), Shu-Fan Shih ( 施書帆 ), Pangfeng Liu ( 劉邦鋒 ), Yi-Min.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Security of the Internet of Things: perspectives and challenges
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
SPIN: Sensor Protocols for Information via Negotiation
Presented by Edith Ngai MPhil Term 3 Presentation
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
The Beta Reputation System
A Study of Group-Tree Matching in Large Scale Group Communications
Giannis F. Marias, Vassileios Tsetsos,
Lei Chen and Wendi B. Heinzelman , University of Rochester
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Interoperability versus Cyber Security/Information Assurance?
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Alex Ladas, Deepak GC and Christos Politis christospolitis.com
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Multimedia Support for Wireless W-CDMA with Dynamic Spreading
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
ACHIEVEMENT DESCRIPTION
Presentation transcript:

Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†, Jin-Hee Cho*, Ananthram Swami* and Kevin S. Chan*

Introduction Service-oriented mobile ad hoc network (MANET) is populated with service providers (SPs) and service requesters (SRs) In this paper, the authors are concerned with: satisfying user service requests with multiple objectives including maximizing quality-of-service (QoS) and quality-of-information (QoI) while minimizing the service cost with user satisfaction (US) ultimately measuring success multi-objective optimization (MOO).

SYSTEM MODEL Two roles: service provider (SP) and service requestor (SR) Example: A user in a smart city issues a service request “take me to a nice Thai restaurant nearby with drunken noodle on its menu” with a service quality specified in terms of QoI, QoS, and cost for the overall service Service composition phase: transportation + food Service binding phase: select the best SPs out of all SPs available to the user at the time the service request is issued

SYSTEM MODEL Service Quality Criteria: QoI, service Delay (as a QoS attribute), and Cost. Normalization: Max and Min are known a priori Q,D,C MOO => multi-objective maximization

SYSTEM MODEL Malicious behaviors: Self-promotion: reporting false service quality information Opportunistic service: “just enough” service Bad-mouthing attack (BMA): providing bad recommendations Ballot stuffing attack (BSA): boost the reputation for bad nodes Packet dropping: drop packets

SERVICE COMPOSITION AND BINDING Service Advertisement Reply

SERVICE COMPOSITION AND BINDING Service composition specification (SCS): Constraints:

SERVICE COMPOSITION AND BINDING Service Binding SP can only participate in one service request at a time to ensure its availability and commitment to a single service request.

PROBLEM DEFINITION AND METRICS parallel structure series structure

PROBLEM DEFINITION AND METRICS MOO Problem Formulation system level: Preferences of SR

PROBLEM DEFINITION AND METRICS User Satisfaction: different from MOO value ratio of the actual service quality received to the best service quality available among SPs for executing Om Compare with USTm: user satisfaction threshold

TRUST MANAGEMENT PROTOCOL Trust management schemes: BRS: single-trust beta reputation system Multi-trust Protocol Design threshold-based relationship model (TRM) scaling relationship model (SRM)

TRUST MANAGEMENT PROTOCOL Single-trust Baseline Protocol Design (BRS) A positive evidence is observed when SRm is satisfied (USm exceeds USTm )

TRUST MANAGEMENT PROTOCOL Multi-trust Protocol Design Competence: intrinsic service capability, “true” Q, D, and C scores Integrity: degree complies with the protocols

TRUST MANAGEMENT PROTOCOL Multi-trust Protocol Design Still How to count ? For competence: the same with BRS For integrity: positive if SR sees node j’s observed Q, D and C scores are close to node j’s advertised scaled Q, D, and C scores Compare with

TRUST MANAGEMENT PROTOCOL Trust formation Threshold-based relationship model (TRM) : Scaling relationship model (SRM): More strict

ALGORITHM DESCRIPTION Four algorithms Non-trust-based BRS TRM SRM

ALGORITHM DESCRIPTION Non-trust-based blacklist of SPs: randomly select

ALGORITHM DESCRIPTION Trust-based Modify By multiplying to each single node in the bottom layer

RESULTS AND ANALYSIS Experiment Setup Proposed method: Heuristic-based solution (linear runtime complexity) SR ranks all eligible SPs for executing an abstract service and selects the highest ranked SP as the winner for executing that particular abstract service Optimal solution to be compared: Integer Linear Programming (exponential runtime complexity )

RESULTS AND ANALYSIS Comparative Performance Analysis

RESULTS AND ANALYSIS Effect of Service Quality Constraints and Opportunistic Service Attacks

RESULTS AND ANALYSIS Effect of Q, D, C Score Distribution