Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Trustworthy Service Selection and Composition CHUNG-WEI HANG MUNINDAR P. Singh A. Moini.
Security in Mobile Ad Hoc Networks
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Trustworthiness Management in the Social Internet of Things
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 Robust Trust Establishment for MANETs by Charikleia Zouridaki ECE Dept., George Mason University Fairfax, VA Joint work with: Brian L. Mark, Marek.
High-integrity Sensor Networks Mani Srivastava UCLA.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
Trustworthiness Management in the Social Internet of Things
Giannis F. Marias, Vassileios Tsetsos,
Wireless Sensor Network Architectures
Lei Chen and Wendi B. Heinzelman , University of Rochester
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Environment-Aware Reputation Management for Ad Hoc Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
TCP in Mobile Ad-hoc Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
TCP in Wireless Ad-hoc Networks
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
MECH 3550 : Simulation & Visualization
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017

Introduction - MANETs MANETs- Mobile ad hoc networks lacks infrastructure and central authority to establish and facilitate communication in the network composed of a set of autonomous devices that work as network nodes agreeing to relay packets for each other and have dynamic topologies, with resource constraints, and limited physical security formation and sustained existence of MANET services are mainly based on an individual node’s cooperation in packet forwarding.

Introduction – Trust Management in MANETs Vulnerable to misbehaving Nodes Trust in MANETs is the opinion held by one node (known as evaluating node) about another node (known as evaluated node), based upon the node’s past behavior and recommendations from other nodes (known as recommending nodes) in the network. Trust Management Frameworks: Direct interaction Direction interaction and recommendation Challenges

Related Work CONFIDANT CORE RESTrust Soltani et al. Li et al. deviation test only accepts negative recommendations CORE only accepts positive recommendations RESTrust Fuzzy recommendation similarity Soltani et al. Trust based on direct observation and recommendation Li et al. Uses confidence value Hermes et al. Use acceptability threshold in relation to confidence value Velloso et al. Relation maturity (longer term associates recommendations are weighed higher) Yu et al. Clustering technique to filter out trustworthy recommendations from untrustworthy ones

Types of Attacks

The Proposed Model

The Proposed Model Trust Computation Component uses direct as well as indirect (second hand) trust information. Recommendation Manager Component requests and gathers recommendations for a node from a list of recommending nodes Cluster Manager Component filters out dishonest recommendations from the list and sends out a list of trustworthy recommendations to the manager component.

Trust Computation Component Bayesian statistical approach is used in for computing trust values based on the assumption that they follow a beta probability distribution. Alpha – forwarding packets (+ve observation) Beta – dropped packets (-ve observation) Cold-start problem Set initial constant value of trust Data Sparsity problem Uses nearest neighbor clustering technique to assign ratings and reduce the sparsity

Trust Computation Component Direct trust Obtains direct trust value from two nodes that have already initiated a trust relationship. Decay factor - Change in influence over time Additional new interaction (+ve/-ve) at time t i+1 No observed interaction at time t i+1

Trust Computation Component Indirect Trust – no previous trust relationship the direct observations obtained by one node about its neighbors which can be used by another node as second-hand information. It can be vulnerable to dishonest recommendation Total trust Tij is calculated by combing both direct and indirect trust values with different weights:

Recommendation Manager Recommendation manager in the proposed model works as an intermediate component between indirect trust computation and cluster manager components. Recommendation manager has three important roles: 1) send recommendation request to the evaluating node’s neighbors; (2) collect received recommendation and send it to the cluster manger which runs the filtering procedure; (3) receive the filtered recommendation and send it back to the trust computation component.

Clustering Criteria Nodes are clustered based on three values namely: confidence value deviation value closeness value

Clustering Criteria – Confidence Value can be used to solve the problem of short-term and long-term observations Confidence value starts from 0 in case of no observations between nodes Nodes with higher confidence value are desirable Nodes with high confidence in the early rounds are more likely to be attackers confidence value is computed as the variance of the beta distribution

Clustering Criteria – Confidence Value Proposed model vs TMUC model confidence value comparison

Clustering Criteria – Deviation Value represents to what extent the received recommendation is compatible with the personal experience of evaluating node. Each node compares received recommendation with its own first-hand information and accepts only those not deviating too much from self-observations. In case of missing historical interaction with evaluated node, the proposed method compares the confidence level of the evaluating node with that of the recommending node.

Clustering Criteria – Deviation Value The deviation test is only applied if both nodes have similar level of confidence. Deviation value Vijdev is calculated as :

Clustering Criteria – Closeness Value uses the concept of closeness centrality between the evaluating nodes and the recommending node from the social trust closeness centrality is a measure of the distance between the evaluating node and the recommending node close nodes are likely to possess same nature and counter nearly same environmental and operational conditions over a period of time in the network trust values for the close neighbours converge to nearly same level. This may help in recognizing the untrustworthy recommending node whose recommendation is much different from the close recommending nodes

Clustering Criteria – Closeness Value Closeness value Vcloseij refers to the degree of node i’s closeness to a recommending node k at time t:

Cluster Manager receives a list of recommendations from the recommendation manager and processes it using a clustering technique. Clustering algorithm is run by the evaluating node on all the recommendations in the list A vector of three values (Vconf, Vdev, Vclose) is provided by a recommending node for the clustering operation. Divides vectors into pre defined number of clusters.

Clustering Algorithm

Cost of Defense Scheme proposed defense scheme is lightweight only recommendation request and reply packets are used to send and receive a list of recommendations. Data size and length – (3 parameters: positive and negative observations and current position) On demand scheme Cost: Complexity Memory consumption Time consumption

Simulation Simulation is conducted using NS2 simulator Network with 50 mobile nodes in an area of 700*700 square meters Bad mouthing , ballot stuffing attacks is used 15 source–destination nodes

Performance Evaluation Performance of network is represented by two parameters: Network Throughput Packet Loss It is evaluated in the presence of bad-mouthing, ballot stuffing and selfish nodes

Performance Evaluation -Throughput

Performance Evaluation – Packet Loss

Performance Evaluation – Indirect Trust

Performance Evaluation – Bad mouthing attack

Performance Evaluation – Ballot-Stuffing attack

Performance Evaluation- Disabling confidence, deviation, closeness

Performance Evaluation- comparison with maturity model

Conclusion/Main Idea of Paper Proposes a recommendation based trust model with a defence scheme to filter out attacks related to dishonest recommendations like bad-mouthing, ballot-stuffing, and collusion for mobile ad hoc networks. The recommending node is chosen based on three factors to check its honesty: number of interactions with the evaluated node, unity of view with the evaluating node for solving the problem of the scarcity of knowledge, closeness to the evaluating node.

Thank you!