Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs

Authors

  • Hesham El-Sayed
  • Sharmi Sankar
  • Heng Yu
  • Gokulnath Thandavarayan United Arab Emirates University

Keywords:

direct trust computations, hybrid trust computations (HTC), heterogeneous distributed networks (HDNs), receiver operating characteristics, recommendation trust computations (RTC)

Abstract

In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address the security issues in HDNs. These techniques utilize too many resources, resulting in higher network overheads. This being classified under light weight security scheme, the Trust Management System (TMS) tends to be one of the most promising technology, featured with more efficiency in terms of availability, scalability and simplicity. It advocates both the node level validation and data level verification enhancing trust between the attributes. Further, it thwarts a wide range of security attacks by incorporating various statistical techniques and integrated security services. In this paper, we present a literature survey on different TMS that highlights reliable techniques adapted across the entire HDNs. We then comprehensively study the existing distributed trust computations and benchmark them in accordance to their effectiveness. Further, performance analysis is applied on the existing computation techniques and the benchmarked outcome delivered by Recommendation Trust Computations (RTC) is discussed. A Receiver Operating Characteristics (ROC) curve illustrates better accuracy for Recommendation Trust Computations (RTC), in comparison with Direct Trust Computations (DTC) and Hybrid Trust Computations (HTC). Finally, we propose the future directions for research and highlight reliable techniques to build an efficient TMS in HDNs.

References

Babu S.S., Raha A., Naskar M.K. (2011); Geometric mean based trust management system for WSNs (GMTMS), Information and Communication Technologies (WICT), 444-449, 2011.

Bao F., Chen R., Chang M., Cho J.H. (2012); Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Transactions on Network and Service Management, 9(2), 69-83, 2012.

Baronti P., Pillai P., Chook V.W., Chessa S., Gotta A., Hu Y.F. (2007); Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards, Computer communications, 30(7), 1655-1695, 2007. https://doi.org/10.1016/j.comcom.2006.12.020

Chen Y.M., Wei Y.C. (2013); A beacon-based trust management system for enhancing user centric location privacy in VANETs, Journal of Communications and Networks, 15(2), 153-63, 2013. https://doi.org/10.1109/JCN.2013.000028

Chaurasia B.K., Verma S., Tomar G.S. (2013); Trust computation in VANETs, 2013 International Conference on Communication Systems and Network Technologies (CSNT), 468-471, 2013.

Chang B.J., Kuo S.L. (2009); Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs, IEEE Transactions on Vehicular Technology, 58(4), 1846-63, 2009. https://doi.org/10.1109/TVT.2008.2005415

Cho J.H., Swami A., Chen R. (2012); Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks, Journal of Network and Computer Applications, 35(3), 1001-12, 2012. https://doi.org/10.1016/j.jnca.2011.03.016

Conti M., Giordano S. (2014); Mobile ad hoc networking: milestones, challenges, and new research directions, IEEE Communications Magazine, 52(1), 85-96, 2014. https://doi.org/10.1109/MCOM.2014.6710069

Cho J.H., Swami A., Chen R. (2011); A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 13(4), 562-83, 2011. https://doi.org/10.1109/SURV.2011.092110.00088

Dias J.A., Rodrigues J.J., Zhou L. (2014); Cooperation advances on vehicular communications: A survey, Vehicular Communications, 1(1), 22-32, 2014. https://doi.org/10.1016/j.vehcom.2013.11.003

Earle T.C. (2010); Trust in risk management: a model-based review of empirical research, Risk Analysis, 30(4), 541-74, 2010. https://doi.org/10.1111/j.1539-6924.2010.01398.x

Gazdar T., Rachedi A., Benslimane A., Belghith A. (2012); A distributed advanced analytical trust model for VANETs, Global Communications Conference (GLOBECOM), 201-206, 2012.

Hartenstein H., Laberteaux L.P. (2008); A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, 46(6), 164-171, 2008. https://doi.org/10.1109/MCOM.2008.4539481

Hanzo L., Tafazolli R. (2007); A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 50-70, 2007. https://doi.org/10.1109/COMST.2007.382407

Khan Pathan A.S. (2010); Security of self-organizing networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2010.

Lee U., Gerla M. (2010); A survey of urban vehicular sensing platforms, Computer Networks, 54(4), 527-44, 2010. https://doi.org/10.1016/j.comnet.2009.07.011

Li F., Wang Y. (2007); Routing in vehicular ad hoc networks: A survey, IEEE Vehicular Technology Magazine, 2(2), 12-22, 2007. https://doi.org/10.1109/MVT.2007.912927

Li W., Song H. (2016); ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, 17(4), 960-9, 2016. https://doi.org/10.1109/TITS.2015.2494017

Minhas U.F., Zhang J., Tran T., Cohen R. (2011); A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks, IEEE Transactions on Systems, Man, and Cybernetics, 41(3), 407-20, 2011. https://doi.org/10.1109/TSMCC.2010.2084571

Momani M., Aboura K., Challa S. (2007); RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks, Intelligent Sensors, Sensor Networks and Information, 2007, 347-352, 2007.

Mali G., Misra S. (2016); TRAST: Trust-Based Distributed Topology Management forWireless Multimedia Sensor Networks, IEEE Transactions on Computers, 65(6), 1978-91, 2016. https://doi.org/10.1109/TC.2015.2456026

Oliveira L.M, Rodrigues J.J.(2011); Wireless Sensor Networks: A Survey on Environmental Monitoring, JCM, 6(2), 143-51, 2011.

Pantazis N.A, Nikolidakis S.A., Vergados D.D. (2013); Energy-efficient routing protocols in wireless sensor networks: A survey, IEEE Communications Surveys and Tutorials, 15(2), 551-91, 2013. https://doi.org/10.1109/SURV.2012.062612.00084

Ren Y., Zadorozhny V.I, Oleshchuk VA, Li F.Y. (2014); A novel approach to trust management in unattended wireless sensor networks, IEEE Transactions on Mobile Computing, 13(7), 1409-23, 2014. https://doi.org/10.1109/TMC.2013.22

Rezende C., Boukerche A., Pazzi R.W., Rocha B.P., Loureiro A.A. (2011); The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011.

The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011. https://doi.org/10.1016/j.jpdc.2010.12.009

Shabut A.M., Dahal K.P., Bista S.K., Awan I.U. (2015); Recommendation based trust model with an effective defense scheme for MANETs, IEEE Transactions on Mobile Computing, 14(10), 2101-15, 2015. https://doi.org/10.1109/TMC.2014.2374154

Tan S., Li X., Dong Q. (2016); A Trust Management System for Securing Data Plane of Ad-Hoc Networks, IEEE Transactions on Vehicular Technology, 65(9), 7579-92, 2016. https://doi.org/10.1109/TVT.2015.2495325

Velloso P.B., Laufer R.P., Cunha D.D., Duarte O.C., Pujolle G. (2010); Trust management in mobile ad hoc networks using a scalable maturity-based model, IEEE Transactions on Network and Service Management, 7(3), 172-85, 2010. https://doi.org/10.1109/TNSM.2010.1009.I9P0339

Yu H., Shen Z., Miao C., Leung C., Niyato D. (2010); A survey of trust and reputation management systems in wireless communications, Proceedings of the IEEE, 98(10), 1755-72, 2010. https://doi.org/10.1109/JPROC.2010.2059690

Zhao S., Aggarwal A., Frost R., Bai X. (2012); A survey of applications of identity-based cryptography in mobile ad-hoc networks, IEEE Communications Surveys and Tutorials, 14(2), 380-400, 2012. https://doi.org/10.1109/SURV.2011.020211.00045

Zhang J. (2011); A survey on trust management for vanets, Advanced Information Networking and Applications, 105-112, 2011.

Zouridaki C, Mark B.L, Hejmo M, Thomas R.K. (2005); A quantitative trust establishment framework for reliable data packet delivery in MANETs, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI: 10.3233/JCS-2007-15102, 1-10, 2005. https://doi.org/10.3233/JCS-2007-15102

Zhang J., Chen C., Cohen R. (2013); Trust modeling for message relay control and local action decision making in VANETs, Security and Communication Networks, DOI: 10.1002/sec.519, 6(1), 1-4, 2013. https://doi.org/10.1002/sec.519

Published

2017-09-10

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.