Trust Management in Mobile Ad Hoc Networks Using Maturity-Based Model

trust management in mobile ad hoc networks using n.w
1 / 49
Embed
Share

Explore trust management in mobile ad hoc networks through a scalable maturity-based model, focusing on trust calculation, recommendations from neighbors, and the Relationship Maturity concept. Learn how the Trust Model assigns trust levels to nodes and utilizes the Recommendation Exchange Protocol for monitoring.

  • Trust Management
  • Mobile Ad Hoc Networks
  • Maturity Model
  • Recommendation Protocol
  • Network Security

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto Carlos M. B. Duarte, and Guy Pujolle Paper Presentation By : Gaurav Dixit (gdixit@vt.edu)

  2. Outline Introduction Trust Model Implementation Results

  3. Introduction MANets - same node can work as router server client Assumption of good behavior Not true! Trust needs to be measured - This paper provides one such method. Applying human trust dynamics to trust calculation of nodes Builds on recommendations

  4. Trust level of a node depends on:= (previous individual experiences) + (recommendation from neighbors) Benefits of trust calculation: avoid sending packets to malicious nodes. increased co-operation among good nodes.

  5. Recommendations collected only from neighbors. Advantages for nodes: Less storage Less power requirement Less processing Better for changing topologies information for entire network not required

  6. Since, recommendations not forwarded, it is good for networks: Less recommendation messages travelling in network - low traffic Low energy consumption for entire network

  7. Relationship Maturity Similar to human trust behavior, more weightage is given to the recommendations from older neighbors.

  8. Trust Model Trust level assigned to each neighbor. Trust value reflects behavior history, and thus expected future behavior. Node forms opinion based on experiences. Transmission of these opinions about node i are called recommendations.

  9. Trust Model Recommendations compensate for lack of monitoring capabilities. Paper defines Recommendation Exchange Protocol (REP)

  10. Trust Model Trust level varies from 0 to 1. Recommendation from C more important than that from B, because of relationship maturity.

  11. Trust Model: Architecture Two parts: I) Learning Plan: gathers and converts information into knowledge. II) Trust plan: assess trust level of each neighbor using stored knowledge and recommendations.

  12. Trust Model: Components

  13. Trust Model: Components Behavior monitor observes network, indicates new neighbors to Rec Manager, and send behavior report to Classifier. Classifier sends behavior classification to Experience Calculator. Trust Calculator calculates trust with inputs from experiences and recommendations. Auxiliary Trust Table entries correspond to relationship maturity. Trust table entries have timeout.

  14. Trust Model: Components Three operation modes: I) Simple: Just trust table, REP optional II) Intermediate: Simple mode plus storage of recommendations III) Advanced: Complete system implementation. Recommendation Manager implements REP. All nodes are in advanced mode in this paper.

  15. Trust level evaluation ??(?) = (1 ?)??(?) + ???(?) ??(?) = ???(?) + (1 ?)??(?) Ta(b) ->Trust calculation from node a for node b Qa(b) -> Personal Experience Ra(b) -> Recommendations All variables(except a & b) range from 0 to 1.

  16. Recommendation Computation ?? subset of neighbors ??(?) relationship Maturity ??(?) random variable with normal distribution representing recommendation uncertainty. ??(?) = ?(??(?), ??(?))

  17. First Trust Values Initial trust values can be: I) Prudent : Strangers have low trust value II) Optimist: High trust in new neighbors. III) Moderate: Trust value between Prudent and optimist. Fa First trust value ??(?) = (1 ?)?? + ???(?)

  18. Recommendation Exchange Protocol Only one hop neighbors considered. ( IP TTL=1) Consists of: I) TREQ: Trust Request II) TREP: Trust Reply III) TA: Trust Advertisement

  19. REP TREQ sent when nodes first meet, with IP of new neighbor as target node. Wait time tREQ before sending TREQ TREP sent by neighbors who have target node as their neighbor, after waiting for random time period tREP TA sent if trust level changes by threshold ?

  20. Authentication A pair of public-private key for each node is sufficient for the system to work. Sybil attack would not be a problem since the malicious identities are quickly found and ignored.

  21. Trust Model Implementation Learning Plan

  22. Nature of nodes vary from 0 (untrustworthy) to 1 (trustworthy) A node with nature of 0.8 would do 8 good actions out of 10. Behavior Monitor is emulated by concept of perception, which indicates probability of noticing a certain action. Classifier (perfectly) classifies actions.

  23. Node will decide for itself whether or not it will use behavior monitor in promiscuous mode. Required perception value and personal constraints would help in this decision. Experience Calculator observes imin actions before calculating trust. Higher perception would result in more accurate trust level. But higher imin means higher convergence time. Paper assumes imin =10

  24. Results: Small networks All nodes are at one hop distance. Time in seconds. Convergence at t=350 for ? = ? = ? = 0.5

  25. Results: Small networks Optimistic first trust strategy. Time in minutes. Nature set to 0.2 . Number of neighbors varied.

  26. Results: Small networks Neighbors =15 Varying alpha

  27. Results: Small networks Perception ? is the fraction of actions a node can notice from its neighbors Varying ?

  28. Results: Multihop MANets Analyzing movement in more complex networks. 21 nodes with 250m transmission range, placed in 1000 m 400 m . ? = ? = ? = 0.5 First trust optimist (0.9) Nature of nodes = 0.2

  29. Results: Multihop m1 keeps 3 old neighbors m2 has no old neighbors

  30. Results: Multihop m1 keeps 3 old neighbors m2 has no old neighbors

  31. Results: Multihop Node speeds three times faster.

  32. Results: Multihop Varying perception lower perception takes longer time to converge.

  33. Results: Relationship maturity Node 1,8,15 go to zone F2. Evaluating trust level of node 8 about node 20

  34. Results: Relationship maturity Using lower perception value(0.2) Note that recommendati ons are important in low perception cases

  35. Results: Lying Attacks 20 nodes -250m transmission range, placed in a 150 m 150m Node 1 changes nature from 0.9 to 0.2

  36. Results: Lying Attacks Malicious nodes fixed at 40%

  37. Results: Lying Attacks Slander Attack Node2 evaluating node1 which has nature 0.9 Pessimistic strategy (Fa=0.1)

  38. Results: Lying Attacks Slander Attack Varying alpha

  39. Results: Lying Attacks Slander Attack Varying perception parameter.

  40. Results: Lying Attacks Slander Attack Malicious nodes lie after t=200

  41. Results: Lying Attacks Slander Attack Malicious nodes identification time varying

  42. Results: Lying Attacks Slander Attack Malicious nodes identification time varying

  43. REP To reduce number of messages sent across network: TREQ is sent once containing multiple target nodes, using timer based approach. TREP instead of sending once per request, implemented as broadcast this saves 85% TREP implemented, additionally, with timer, saves 99% messages. TA implemented with a threshold to reduce its occurrence.

  44. REP

  45. REP Changing the value of Trust threshold(?)

  46. REP Changing the value of Trust threshold(?) and its impact on trust levels.

  47. Discussion Using smart timers in suppressing redundant messages scales well in large networks, reducing overhead for trust management by 85 to 99%. Increasing value of improves the trust model efficiency, since we can use already derived results (by neighbors) in the form of recommendations.

  48. Conclusion Flexible trust evaluation model proposed based on concept of human trust, which uses recommendations and relationship maturity. Recommendation Exchange Protocol (REP) proposed. Model highly scalable since only neighbors consulted. Model tolerates 35 % liars Trust level error reduced by 50% by using relationship maturity parameter.

  49. Thank You!

Related


More Related Content