Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Supporting Cooperative Caching in Disruption Tolerant Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems Authors: Ding-Chau Wang. Weiping He. Ing-Ray Chen Presented.
A Survey of Trust Management for Mobile Ad Hoc Networks
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks Maurice Chu, Horst Haussecker and Feng Zhao Xerox Palo.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Effect Of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Author: J.H. Cho, I.R. Chen and P.G. Feng.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Authors: Ing-Ray Chen Weiping He Baoshan Gu Presenters: Yao Zheng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
1 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Fenye Bao, Ing-Ray Chen,
Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding Bing Wang.
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Wireless communications and mobile computing conference, p.p , July 2011.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Distributed Channel Assignment and Routing Multiradio Mutlichannel Multihop Wireless Networks Haitao Wu, Fan Yang, Kun Tan, Jie Chen, Qian Zhang, and Zhenshrng.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Ding-Chau Wang, Weiping He, Ing-Ray Chen Virginia Tech Presented by Weisheng Zhong and Xuchao Zhang CS 5214 (Fall 2015)
Measuring Behavioral Trust in Social Networks
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
1 A Multi-Rate Routing Protocol with Connection Entropy for MANETs Cao Trong Hieu, Young Cheol Bang, Jin Ho Kim, Young An Kim, and Choong Seon Hong Presenter:
Spectrum Sensing In Cognitive Radio Networks
Computer Science and Engineering 1 Mobile Computing and Security.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Reducing the Number of Hops between Communication Peers in a Bluetooth Scatternet Csaba Kiss Kalló, Carla-Fabiana Chiasserini, Roberto Battiti, Marco Ajmone.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Performance Evaluation of Scheduling in IEEE based Wireless Mesh Networks Bo Han, Weijia Jia,and Lidong Lin Computer Communications, 2007 Mei-zhen.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Presented by Edith Ngai MPhil Term 3 Presentation
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Giannis F. Marias, Vassileios Tsetsos,
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Effective Replica Allocation
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
by Xiang Mao and Qin Chen
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications Surveys & Tutorials, IEEE 13.4 (2011): Speaker: Liang Zhao

Outline 1.Background 2.Trust Management Protocol 3.Model-based Evaluation Technique. 4.Evaluation Results 5.Conclusion and Future Works

Background Trust Management: A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self- configuring network of mobile devices connected by wireless links. Mobile Ad Hoc Network (MANETs): 1. Abstract system that processes symbolic representations of social trust 2. Aid automated decision-making process.

Problems in MANET trust Management 1. Traditional QoS Trust Metrics did not consider Social Trust as metric. 2. Existing trust Metrics lack good aggregation parameter settings. 3. Effectiveness of Trust Management Protocol is hard to be evaluated due to difficulty of getting labels based on ground truth.

Contributions 1. Consider social metrics: i.e. intimacy (social ties) and honesty (healthiness). 2. Identify best trust aggregation parameter settings for each trust metric. 3. For validating proposed trust management protocol, a novel model-based evaluation technique is leveraged to generate ground truth. SQTrust Model-based Evaluation

SQTrust: A New Trust Management Protocol

SQTrust: Preliminary 1. Social Ties (Intimacy) 2. Honesty (Healthiness) measure the social trust level of a node as these social properties are considered critical for trustworthy mission execution Most important metrics to measure the QoS trust level of a node 3. Competence (Energy) 4. Protocol compliance (Cooperativeness) Trust Metrics (trust components) taken into account:

SQTrust: A New Trust Management Protocol What is it for? How to infer it? By collecting all the observations from other nodes For inferring the trust belief of each node in the network Trust Observations of node j by node i

SQTrust: A New Trust Management Protocol Consider the following trust metrics (namely trust components): 1. Intimacy 2. Healthiness 3. Energy 4. Cooperativeness Social Metrics Qos Metrics Weight of each trust component Each trust component How to determine them?

SQTrust: A New Trust Management Protocol Consider both direct trust and indirect trust. How to determine them? Directly collected by Node i toward node j. Indirect evidences given to node i by a subset of 1-hop neighbors selected.

SQTrust: Direct Trust How to infer the Direct Trust of a node? Well, it depends. - If Node i is 1-hop neighbor of node j -Otherwise, exponential trust decay over time.

SQTrust: indirect trust Inferring Indirect Trust is a little more complex. 1. Selection of Subset of 1-hop neighbors. Threshold-based filtering: only consider trustworthy recommenders Relevance-based trust: only consider trustworthy nodes under current trust component <threshold compromised Low trust in healthiness

Trust decay over spaceTrust decay over time SQTrust: Indirect Trust 2.Calculation of indirect trust -If there is at least one qualified neighbor: -Otherwise, Node i’s trust in node m Node m’s trust in node j

Model-based Evaluation

Schema: 1. Leverage SPN to build a semi-Markov chain to generate the nodes’ status. 2. Reward Assignment for each status. 3. Objective trust calculation.

a semi-Markov chain for node status Node Status is of 5 status representations: 1. Location.(int) 2. Member.(boolean) 3. Energy.(boolean) 4. Healthiness.(boolean) 5. Cooperativeness.(boolean) trust components To tell the position proximity of nodes

Location Is fired when node moves to another region. What is it for? 1. Enable the underlying semi-Markov model to give the probability that each node is in a certain region. 2. Thus to tell whether a node is 1-hop neighbor of another. # of tokens depends on the region a node moving into Initial speed Wireless radio range

Intimacy Consider both direct trust and indirect trust. For direct trust: 1. utilize location probability of a node to infer if nodes i and j are 1-hop neighbors. Based on the probability node i and node j are in the same region.

Energy To get the probability of current energy level of a node. initialize different value to different nodes to emphasize the heterogeneity. -lower when node becomes uncooperative to save energy -higher when being compromised Initial # of tokens: depends on the initial value Transition rate:

Healthiness (CN) A node is compromised when T_COMPRO fires Transition rate: _ A token goes to CN when a node is compromised Then, either of below can happen: 1. Good-mouth a bad node with a high trust recommendation 2. Bad-mouth a good node with a low trust recommendation

Cooperativeness (UNCOOP) A token goes to UNCOOP when a node is uncooperative. depends on energy, mission difficulty and neighborhood uncooperativeness degree: Lower energy, less cooperative Harder the mission, more cooperative Less cooperative 1-hop neighbors, more cooperative Group communication interval

Reward Assignment for each status

Objective Trust Calculation (1) For healthiness, energy or cooperativeness: (2) For intimacy: by aggregating all the trust components calculated as: Probability the system is at status s at time t

Evaluation Results

Parameter Settings Total 150 nodes, initially all are not compromised in MANETs. Initially all are trustworthy Based on ns3 simulation

Evaluation Results Overall trust values from subjective trust v.s. objective trust The value around 85% is the best trade-off

Conclusions and Future Works 1. Purpose of this paper: A protocol which minimizes the trust bias and maximize application performance. 2. Applicability: Based on the optimal protocol settings we get, we apply it for dynamic trust management with considering the environment changes. Future Works: Consider more sophisticated attacker behaviors, i.e. opportunistic, random and insidious attacks.

Thanks