Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks Author: Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Member, IEEE Computer.

Similar presentations


Presentation on theme: "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks Author: Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Member, IEEE Computer."— Presentation transcript:

1 Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks Author: Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Member, IEEE Computer Society, Heejo Lee, Member, IEEE, Sungyoung Lee, Member, IEEE, and Young- Jae Song Department of Computer Engineering, Kyung Hee University, Suwon, Korea. Wayne State University. Division of Computer and Communication Engineering, Korea University, Seoul. Int. Conf. IEEE Transactions on Parallel and Distributed Systems, vol. 20, no.11, November, 2009. Advisor : Han-Chieh Chao Reporter : Hsu, Hsiu-Chi Date :2011/08/02 1

2 2 Introduction Related work Group-based trust management scheme Theoretical analysis and evaluation Simulation-based analysis and evaluation Conclusions Outline

3 Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks. Due to their higher consumption of resources such as memory and power. Author propose a new lightweight Group based Trust Management Scheme (GTMS) for wireless sensor networks. 3 Introduction

4 Which employs clustering approach reduces the cost of trust evaluation, less memory, energy, and communication overheads. As compared to the current state-of-the-art trust management schemes and it is more suitable for large-scale sensor networks. 4 Introduction

5 To author knowledge, very few trust management schemes have been proposed such as RFSN, ATRM, and PLUS. RFSN assumes that the node has enough interactions with the neighbors so that the reputation (beta distribution) can reach a stationary state. However, if the rate of node mobility is higher, reputation information will not stabilize. The scheme will not be able to cope with uncertain situations. 5 Related work

6 ATRM assumes there is a single trusted authority, which is responsible for generating and launching mobile agents, which makes it vulnerable against a single point of failure. It also assumes that mobile agents are resilient against malicious nodes that try to steal or modify information carried by the agent. In many applications, this assumption may not be realistic. 6 Related work

7 PLUS, the authors assume that all the important control packets generated by the BS must contain a hashed sequence number (HSN). Inclusion of HSN in control packets not only increases the size of packets resulting in higher consumption of transmission and reception power, but also increases the computational cost at the SNs. 7 Related work

8 Based on the trust values, a node assigns one of the three possible states: 1. trusted, 2. untrusted, or 3. uncertain to other member nodes. Author group-based trust model works in three phases: 1. Trust calculation at the node level. 2. Trust calculation at the cluster-head level. 3. Trust calculation at the BS level. 8 Group-based trust management scheme

9 Fig 1: Conceptual Group based Trust Model Scenario 9 Fig. 1 Group-based trust management scheme

10 Author introduce timing window ( t), which is used to measure the number of successful and unsuccessful interactions. It consists of several time units. A sample scenario of the GTMS time window scheme is illustrated in Fig. 2. The time window t consists of five units. 10 Group-based trust management scheme △ Fig. 2 △

11 Trust Calculation at the Node Level: Time-Based Past Interaction Evaluation: With this time window information, the time-based past interaction trust value (T x,y ) of node y at node x that lies between 0 and 100 is defined as: (1) S x,y is the total number of successful interactions of node x with y during time t, U x,y is the total number of unsuccessful interactions of node x with y during time t. Which indicates the percentage of successful interactions among the total interactions. 11 Group-based trust management scheme △ △

12 After calculating the trust value, a node will quantize trust into three states as follows: Where f represents half of the average values of all trusted nodes, and g represents one third of the average values of all untrusted nodes. 12 Group-based trust management scheme (2)

13 During the steady-state operation, these values can change with every passing unit of time, which creates dynamic trust boundaries as shown in Fig. 3. After each passage of time t, nodes will recalculate the values of f and g. This trust calculation procedure will continue in this fashion. 13 Group-based trust management scheme Fig. 3 △

14 Peer Recommendation Evaluation: Whenever a node requires peer recommendation, it will send a request to all member nodes except for the untrusted ones. Then, node x calculates the trust value of node y as follows: (5) R x : recommendation of node x, C x : group be composed of node x T x,i is the trust value of the recommender, and T i,y is the trust value of node y sent by node i. 14 Group-based trust management scheme

15 Here, T x,i is acting as a weighted value of the recommender that is multiplied with the trust value T i,y, sent by the recommender, such that the trust value of node y should not increase beyond the trust value between node x and the recommender node i. 15 Group-based trust management scheme

16 Trust Calculation at the Cluster-Head Level: Trust State Calculation of Own Group: Here, author assume that the CH is the SN that has higher computational power and memory as compared to other SNs. In order to calculate the global trust value of nodes in a group, CH asks the nodes for their trust states of other members in the group. Author suppose there are n+1 nodes in the group including the CH. The CH will periodically broadcast the request packet within the group. 16 Group-based trust management scheme

17 Therefore, the CH will define a random variable X such that: (7) The expected value of this random variable is m and the standard deviation is. The CH defines the following standard normal random variable for a node j: (8) If Z [-1,1], then node j is termed as uncertain, else if Z j >1, it is called trusted. If Z j <1, it is labeled as untrusted. 17 Group-based trust management scheme

18 Trust Calculation of Other Groups: During group-to-group communication, the CH maintains the record of past interactions of another group in the same manner as individual nodes keep record of other nodes. Author suppose CH i wants to calculate the trust value (T i,j ) of another cluster j. (9) Then, it can be calculated by using either time based past interaction (PI i,j ) evaluation or by getting recommendation from the BS (BR i,j ). 18 Group-based trust management scheme

19 Trust Calculation at Base Station Level: The BS also maintains the record of past interactions with CHs in the same manner as individual nodes do, as shown below: (10) Where is the nearest integer function, S BS,ch is the total number of successful interactions of BS with CH during time t. U BS,ch is the total number of unsuccessful interactions of BS with CH during time t. 19 Group-based trust management scheme

20 Author suppose there are |G| groups in the network. On reception of trust vectors from all the CHs, the BS will calculate the trust value of each group in a manner shown below: (11) where T BS,ch is the trust value of the CH i at the BS, T Gi,G1 is the trust value of group G 1 at group G i, and |G| represents the total number of groups in the network. 20 Group-based trust management scheme

21 Security Resilience Analysis: The goal of a malicious node while interacting with other nodes is to do as many unsuccessful interactions as possible while keeping the following objectives intact: Obtain a higher trust value for itself than the actual calculated trust value; more importantly, to get into the trusted zone when its rightful place is in the uncertain or untrusted zone, Decrease the trust value of a good node if possible, and increase the trust value of a collaborating bad node if possible. 21 Theoretical analysis and evaluation

22 Resilience Analysis at Node Level: In this section, author test the resilience of our trust model against malicious nodes. Suppose to the contrary that there exists a bad node m for a node i that successfully deceived i. Then, according to the definition: U i,m ≧ S i,m and s i,m = trusted. Then, (12) S i,m. This means that node m has interacted with node i within the time window t. Let a denote the real number U i,m /S i,m. 22 △ Theoretical analysis and evaluation

23 Resilience Analysis at Cluster Head Level: At this stage of the protocol, author check the behavior of a collaboration of really bad nodes (mal). Author assume that in a group with n+1 nodes including the cluster head, the number of really bad nodes are less than or equal to. Then, (13) An m mal, this implies that bad nodes would never make it to the trusted zone at the cluster head. 23 Theoretical analysis and evaluation

24 Resilience Analysis at Base Station Level: These collaborating nodes might try to enhance each other’s trust values at BS by giving high but false recommendations to the BS. So author no consider in recommendations computation. Author assume that the only group that will show dishonest behavior is this set of really bad groups. A set of bad groups B i for the BS is said to have successfully cheated, if for a group j, the trust calculation algorithm “A” for j has the following property: 24 Theoretical analysis and evaluation

25 (14) Where C i is the set obtained by replacing every bad and dishonest group in B i with a bad but honest group. However, since the BS does not ask the recommendation from the bad groups, therefore: (15) 25 Theoretical analysis and evaluation

26 Communication Overhead: Author assume a worst case scenario, in which every member node wants to communicate with every other node in the group, and every group wants to communicate with the rest of the groups in the network. Author assume that the network consists of |G| groups and the average size of groups is σ. 26 Table1. Theoretical analysis and evaluation

27 Comparison: Fig. 4 shows the communication overhead of various trust management schemes for a large-scale WSN (10,000 nodes) having equal size of clusters. It shows that as the number of cluster increases in the network the GTMS introduces less communication overhead as compared to the other schemes. 27 Theoretical analysis and evaluation Fig. 4

28 Memory Consumption Analysis: In Fig. 5 are for 100 SNs. This graph shows that GTMS at SNs and CHs consumes less memory as compared to the ATRM scheme, PLUS, and RFSN scheme. 28 Theoretical analysis and evaluation Fig. 5

29 Author have performed simulation using SENSE. Author have deployed three different sized sensor networks consisting of 144, 225, and 324 SNs. Shown in Fig. 6. and this pattern (overhead difference) approximately remains the same for all 100 simulation runs. 29 Simulation-based analysis and evaluation Fig. 6

30 Communication overhead also affects the energy consumption of the SNs. That effect is visible in Fig.7.8.9, which shows that GTMS also consume less energy as compared to the RFSN scheme. 30 Fig.7, shows 144 SNs Simulation-based analysis and evaluation

31 31 Fig.8, shows 225 SNs Simulation-based analysis and evaluation Fig.9, shows 324 SNs

32 With the emergence of widespread use of WSNs, the need of a proper trust management scheme is strongly felt. Author have proposed a robust lightweight GTMS for clustered WSNs. GTMS uses a hybrid trust management approach, which reduces the cost of trust evaluation. Author showed that they scheme is memory efficient and consumes less communication overhead. Author also proved that the GTMS is intrusion tolerant and provides protection against malicious, selfish, and faulty nodes. 32 Conclusion


Download ppt "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks Author: Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Member, IEEE Computer."

Similar presentations


Ads by Google