Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs

Hesham El-Sayed, Sharmi Sankar, Heng Yu, Gokulnath Thandavarayan

Abstract


In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address the security issues in HDNs. These techniques utilize too many resources, resulting in higher network overheads. This being classified under light weight security scheme, the Trust Management System (TMS) tends to be one of the most promising technology, featured with more efficiency in terms of availability, scalability and simplicity. It advocates both the node level validation and data level verification enhancing trust between the attributes. Further, it thwarts a wide range of security attacks by incorporating various statistical techniques and integrated security services. In this paper, we present a literature survey on different TMS that highlights reliable techniques adapted across the entire HDNs. We then comprehensively study the existing distributed trust computations and benchmark them in accordance to their effectiveness. Further, performance analysis is applied on the existing computation techniques and the benchmarked outcome delivered by Recommendation Trust Computations (RTC) is discussed. A Receiver Operating Characteristics (ROC) curve illustrates better accuracy for Recommendation Trust Computations (RTC), in comparison with Direct Trust Computations (DTC) and Hybrid Trust Computations (HTC). Finally, we propose the future directions for research and highlight reliable techniques to build an efficient TMS in HDNs.


Keywords


direct trust computations, hybrid trust computations (HTC), heterogeneous distributed networks (HDNs), receiver operating characteristics, recommendation trust computations (RTC)

Full Text:

PDF

References


Babu S.S., Raha A., Naskar M.K. (2011); Geometric mean based trust management system for WSNs (GMTMS), Information and Communication Technologies (WICT), 444-449, 2011.

Bao F., Chen R., Chang M., Cho J.H. (2012); Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Transactions on Network and Service Management, 9(2), 69-83, 2012.

Baronti P., Pillai P., Chook V.W., Chessa S., Gotta A., Hu Y.F. (2007); Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards, Computer communications, 30(7), 1655-1695, 2007. https://doi.org/10.1016/j.comcom.2006.12.020

Chen Y.M., Wei Y.C. (2013); A beacon-based trust management system for enhancing user centric location privacy in VANETs, Journal of Communications and Networks, 15(2), 153-63, 2013. https://doi.org/10.1109/JCN.2013.000028

Chaurasia B.K., Verma S., Tomar G.S. (2013); Trust computation in VANETs, 2013 International Conference on Communication Systems and Network Technologies (CSNT), 468-471, 2013.

Chang B.J., Kuo S.L. (2009); Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs, IEEE Transactions on Vehicular Technology, 58(4), 1846-63, 2009. https://doi.org/10.1109/TVT.2008.2005415

Cho J.H., Swami A., Chen R. (2012); Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks, Journal of Network and Computer Applications, 35(3), 1001-12, 2012. https://doi.org/10.1016/j.jnca.2011.03.016

Conti M., Giordano S. (2014); Mobile ad hoc networking: milestones, challenges, and new research directions, IEEE Communications Magazine, 52(1), 85-96, 2014. https://doi.org/10.1109/MCOM.2014.6710069

Cho J.H., Swami A., Chen R. (2011); A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 13(4), 562-83, 2011. https://doi.org/10.1109/SURV.2011.092110.00088

Dias J.A., Rodrigues J.J., Zhou L. (2014); Cooperation advances on vehicular communications: A survey, Vehicular Communications, 1(1), 22-32, 2014. https://doi.org/10.1016/j.vehcom.2013.11.003

Earle T.C. (2010); Trust in risk management: a model-based review of empirical research, Risk Analysis, 30(4), 541-74, 2010. https://doi.org/10.1111/j.1539-6924.2010.01398.x

Gazdar T., Rachedi A., Benslimane A., Belghith A. (2012); A distributed advanced analytical trust model for VANETs, Global Communications Conference (GLOBECOM), 201-206, 2012.

Hartenstein H., Laberteaux L.P. (2008); A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, 46(6), 164-171, 2008. https://doi.org/10.1109/MCOM.2008.4539481

Hanzo L., Tafazolli R. (2007); A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 50-70, 2007. https://doi.org/10.1109/COMST.2007.382407

Khan Pathan A.S. (2010); Security of self-organizing networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2010.

Lee U., Gerla M. (2010); A survey of urban vehicular sensing platforms, Computer Networks, 54(4), 527-44, 2010. https://doi.org/10.1016/j.comnet.2009.07.011

Li F., Wang Y. (2007); Routing in vehicular ad hoc networks: A survey, IEEE Vehicular Technology Magazine, 2(2), 12-22, 2007. https://doi.org/10.1109/MVT.2007.912927

Li W., Song H. (2016); ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, 17(4), 960-9, 2016. https://doi.org/10.1109/TITS.2015.2494017

Minhas U.F., Zhang J., Tran T., Cohen R. (2011); A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks, IEEE Transactions on Systems, Man, and Cybernetics, 41(3), 407-20, 2011. https://doi.org/10.1109/TSMCC.2010.2084571

Momani M., Aboura K., Challa S. (2007); RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks, Intelligent Sensors, Sensor Networks and Information, 2007, 347-352, 2007.

Mali G., Misra S. (2016); TRAST: Trust-Based Distributed Topology Management forWireless Multimedia Sensor Networks, IEEE Transactions on Computers, 65(6), 1978-91, 2016. https://doi.org/10.1109/TC.2015.2456026

Oliveira L.M, Rodrigues J.J.(2011); Wireless Sensor Networks: A Survey on Environmental Monitoring, JCM, 6(2), 143-51, 2011.

Pantazis N.A, Nikolidakis S.A., Vergados D.D. (2013); Energy-efficient routing protocols in wireless sensor networks: A survey, IEEE Communications Surveys and Tutorials, 15(2), 551-91, 2013. https://doi.org/10.1109/SURV.2012.062612.00084

Ren Y., Zadorozhny V.I, Oleshchuk VA, Li F.Y. (2014); A novel approach to trust management in unattended wireless sensor networks, IEEE Transactions on Mobile Computing, 13(7), 1409-23, 2014. https://doi.org/10.1109/TMC.2013.22

Rezende C., Boukerche A., Pazzi R.W., Rocha B.P., Loureiro A.A. (2011); The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011.

The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011. https://doi.org/10.1016/j.jpdc.2010.12.009

Shabut A.M., Dahal K.P., Bista S.K., Awan I.U. (2015); Recommendation based trust model with an effective defense scheme for MANETs, IEEE Transactions on Mobile Computing, 14(10), 2101-15, 2015. https://doi.org/10.1109/TMC.2014.2374154

Tan S., Li X., Dong Q. (2016); A Trust Management System for Securing Data Plane of Ad-Hoc Networks, IEEE Transactions on Vehicular Technology, 65(9), 7579-92, 2016. https://doi.org/10.1109/TVT.2015.2495325

Velloso P.B., Laufer R.P., Cunha D.D., Duarte O.C., Pujolle G. (2010); Trust management in mobile ad hoc networks using a scalable maturity-based model, IEEE Transactions on Network and Service Management, 7(3), 172-85, 2010. https://doi.org/10.1109/TNSM.2010.1009.I9P0339

Yu H., Shen Z., Miao C., Leung C., Niyato D. (2010); A survey of trust and reputation management systems in wireless communications, Proceedings of the IEEE, 98(10), 1755-72, 2010. https://doi.org/10.1109/JPROC.2010.2059690

Zhao S., Aggarwal A., Frost R., Bai X. (2012); A survey of applications of identity-based cryptography in mobile ad-hoc networks, IEEE Communications Surveys and Tutorials, 14(2), 380-400, 2012. https://doi.org/10.1109/SURV.2011.020211.00045

Zhang J. (2011); A survey on trust management for vanets, Advanced Information Networking and Applications, 105-112, 2011.

Zouridaki C, Mark B.L, Hejmo M, Thomas R.K. (2005); A quantitative trust establishment framework for reliable data packet delivery in MANETs, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI: 10.3233/JCS-2007-15102, 1-10, 2005. https://doi.org/10.3233/JCS-2007-15102

Zhang J., Chen C., Cohen R. (2013); Trust modeling for message relay control and local action decision making in VANETs, Security and Communication Networks, DOI: 10.1002/sec.519, 6(1), 1-4, 2013. https://doi.org/10.1002/sec.519




DOI: http://dx.doi.org/10.15837/ijccc.2017.5.2895

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 Sharmi Sankar, Hesham El-Sayed, Heng Yu, Gokulnath Thandavarayan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

CC-BY-NC-ND   license for website user

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."
  • NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of license]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (A. Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (A. Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006). IF=1.374 in JCR2016.

IJCCC is indexed in Scopus from 2008 (SNIP2016 = 0.701, SJR2016 =0.319):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.