Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Computer Systems Engineering Centre University of South Australia An Abstract Model of Routing in Mobile Ad Hoc Networks Cong Yuan, Jonathan Billington,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Distance Vector Routing Protocols Routing Protocols and Concepts Lecture Week 4.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Ad Hoc Network.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Ad-hoc Networks.
Giannis F. Marias, Vassileios Tsetsos,
VLAN Trunking Protocol
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Presentation transcript:

Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto Carlos M. B. Duarte, and Guy Pujolle Paper Presentation By : Gaurav Dixit

Outline Introduction Trust Model Implementation Results

MANets - same node can work as router server client Assumption of good behavior – Not true! Trust needs to be measured - This paper provides one such method. Applying human trust dynamics to trust calculation of nodes Builds on recommendations Introduction

Trust level of a node depends on:= (previous individual experiences) + (recommendation from neighbors) Benefits of trust calculation: avoid sending packets to malicious nodes. increased co-operation among good nodes.

Recommendations collected only from neighbors. Advantages for nodes: Less storage Less power requirement Less processing Better for changing topologies – information for entire network not required

Since, recommendations not forwarded, it is good for networks: Less recommendation messages travelling in network - low traffic Low energy consumption for entire network

Relationship Maturity Similar to human trust behavior, more weightage is given to the recommendations from older neighbors.

Trust Model Trust level assigned to each neighbor. Trust value reflects behavior history, and thus expected future behavior. Node forms opinion based on experiences. Transmission of these opinions about node i are called recommendations.

Trust Model … Recommendations compensate for lack of monitoring capabilities. Paper defines Recommendation Exchange Protocol (REP)

Trust Model… Trust level varies from 0 to 1. Recommendation from C more important than that from B, because of relationship maturity.

Trust Model: Architecture Two parts: I)Learning Plan: gathers and converts information into knowledge. II)Trust plan: assess trust level of each neighbor using stored knowledge and recommendations.

Trust Model: Components

Behavior monitor observes network, indicates new neighbors to Rec Manager, and send behavior report to Classifier. Classifier sends behavior classification to Experience Calculator. Trust Calculator calculates trust with inputs from experiences and recommendations. Auxiliary Trust Table entries correspond to relationship maturity. Trust table entries have timeout.

Trust Model: Components Three operation modes: I)Simple: Just trust table, REP optional II)Intermediate: Simple mode plus storage of recommendations III)Advanced: Complete system implementation. Recommendation Manager implements REP. All nodes are in advanced mode in this paper.

Trust level evaluation () = (1 − )() + () () = () + (1 − )() T a (b) ->Trust calculation from node a for node b Q a (b) -> Personal Experience R a (b) -> Recommendations All variables(except a & b) range from 0 to 1.

Recommendation Computation  subset of neighbors ()  relationship Maturity ()  random variable with normal distribution representing recommendation uncertainty. () = ((), ())

First Trust Values Initial trust values can be: I)Prudent : Strangers have low trust value II)Optimist: High trust in new neighbors. III)Moderate: Trust value between Prudent and optimist. F a  First trust value () = (1 − ) + ()

Recommendation Exchange Protocol Only one hop neighbors considered. ( IP TTL=1) Consists of: I)TREQ: Trust Request II)TREP: Trust Reply III)TA: Trust Advertisement

REP TREQ sent when nodes first meet, with IP of new neighbor as target node. Wait time t REQ before sending TREQ TREP sent by neighbors who have target node as their neighbor, after waiting for random time period t REP TA sent if trust level changes by threshold

Authentication A pair of public-private key for each node is sufficient for the system to work. Sybil attack would not be a problem since the malicious identities are quickly found and ignored.

Trust Model Implementation Learning Plan

Nature of nodes vary from 0 (untrustworthy) to 1 (trustworthy) A node with nature of 0.8 would do 8 good actions out of 10. Behavior Monitor is emulated by concept of perception, which indicates probability of noticing a certain action. Classifier (perfectly) classifies actions.

Node will decide for itself whether or not it will use behavior monitor in promiscuous mode. Required perception value and personal constraints would help in this decision. Experience Calculator observes i min actions before calculating trust. Higher perception would result in more accurate trust level. But higher i min means higher convergence time. Paper assumes i min =10

Results: Small networks All nodes are at one hop distance. Time in seconds. Convergence at t=350 for = = = 0.5

Results: Small networks Optimistic first trust strategy. Time in minutes. Nature set to 0.2. Number of neighbors varied.

Results: Small networks Neighbors =15 Varying alpha

Results: Small networks Perception is the fraction of actions a node can notice from its neighbors Varying

Results: Multihop MANets Analyzing movement in more complex networks. 21 nodes with 250m transmission range, placed in 1000 m × 400 m. = = = 0.5 First trust optimist (0.9) Nature of nodes = 0.2

Results: Multihop … m1 keeps 3 old neighbors m2 has no old neighbors

Results: Multihop … m1 keeps 3 old neighbors m2 has no old neighbors

Results: Multihop … Node speeds three times faster.

Results: Multihop … Varying perception – lower perception takes longer time to converge.

Results: Relationship maturity Node 1,8,15 go to zone F2. Evaluating trust level of node 8 about node 20

Results: Relationship maturity Using lower perception value(0.2) Note that recommendati ons are important in low perception cases

Results: Lying Attacks 20 nodes -250m transmission range, placed in a 150 m × 150m Node 1 changes nature from 0.9 to 0.2

Results: Lying Attacks Malicious nodes fixed at 40%

Results: Lying Attacks Slander Attack Node2 evaluating node1 which has nature 0.9 Pessimistic strategy (F a =0.1)

Results: Lying Attacks Slander Attack Varying alpha

Results: Lying Attacks Slander Attack Varying perception parameter.

Results: Lying Attacks Slander Attack Malicious nodes lie after t=200

Results: Lying Attacks Slander Attack Malicious nodes identification time varying

Results: Lying Attacks Slander Attack Malicious nodes identification time varying

REP To reduce number of messages sent across network: TREQ is sent once containing multiple target nodes, using timer based approach. TREP instead of sending once per request, implemented as broadcast – this saves 85% TREP implemented, additionally, with timer, saves 99% messages. TA implemented with a threshold to reduce its occurrence.

REP

Changing the value of Trust threshold()

REP Changing the value of Trust threshold() and its impact on trust levels.

Discussion Using smart timers in suppressing redundant messages scales well in large networks, reducing overhead for trust management by 85 to 99%. Increasing value of α improves the trust model efficiency, since we can use already derived results (by neighbors) in the form of recommendations.

Conclusion Flexible trust evaluation model proposed based on concept of human trust, which uses recommendations and relationship maturity. Recommendation Exchange Protocol (REP) proposed. Model highly scalable – since only neighbors consulted. Model tolerates 35 % liars Trust level error reduced by 50% by using relationship maturity parameter.

Thank You!