Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs

  • Hesham El-Sayed
  • Sharmi Sankar
  • Heng Yu
  • Gokulnath Thandavarayan United Arab Emirates University

Abstract

In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address the security issues in HDNs. These techniques utilize too many resources, resulting in higher network overheads. This being classified under light weight security scheme, the Trust Management System (TMS) tends to be one of the most promising technology, featured with more efficiency in terms of availability, scalability and simplicity. It advocates both the node level validation and data level verification enhancing trust between the attributes. Further, it thwarts a wide range of security attacks by incorporating various statistical techniques and integrated security services. In this paper, we present a literature survey on different TMS that highlights reliable techniques adapted across the entire HDNs. We then comprehensively study the existing distributed trust computations and benchmark them in accordance to their effectiveness. Further, performance analysis is applied on the existing computation techniques and the benchmarked outcome delivered by Recommendation Trust Computations (RTC) is discussed. A Receiver Operating Characteristics (ROC) curve illustrates better accuracy for Recommendation Trust Computations (RTC), in comparison with Direct Trust Computations (DTC) and Hybrid Trust Computations (HTC). Finally, we propose the future directions for research and highlight reliable techniques to build an efficient TMS in HDNs.

References

[1] Babu S.S., Raha A., Naskar M.K. (2011); Geometric mean based trust management system for WSNs (GMTMS), Information and Communication Technologies (WICT), 444-449, 2011.

[2] Bao F., Chen R., Chang M., Cho J.H. (2012); Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Transactions on Network and Service Management, 9(2), 69-83, 2012.


[3] Baronti P., Pillai P., Chook V.W., Chessa S., Gotta A., Hu Y.F. (2007); Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards, Computer communications, 30(7), 1655-1695, 2007. https://doi.org/10.1016/j.comcom.2006.12.020

[4] Chen Y.M., Wei Y.C. (2013); A beacon-based trust management system for enhancing user centric location privacy in VANETs, Journal of Communications and Networks, 15(2), 153-63, 2013. https://doi.org/10.1109/JCN.2013.000028

[5] Chaurasia B.K., Verma S., Tomar G.S. (2013); Trust computation in VANETs, 2013 International Conference on Communication Systems and Network Technologies (CSNT), 468-471, 2013.

[6] Chang B.J., Kuo S.L. (2009); Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs, IEEE Transactions on Vehicular Technology, 58(4), 1846-63, 2009. https://doi.org/10.1109/TVT.2008.2005415

[7] Cho J.H., Swami A., Chen R. (2012); Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks, Journal of Network and Computer Applications, 35(3), 1001-12, 2012. https://doi.org/10.1016/j.jnca.2011.03.016

[8] Conti M., Giordano S. (2014); Mobile ad hoc networking: milestones, challenges, and new research directions, IEEE Communications Magazine, 52(1), 85-96, 2014. https://doi.org/10.1109/MCOM.2014.6710069

[9] Cho J.H., Swami A., Chen R. (2011); A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 13(4), 562-83, 2011. https://doi.org/10.1109/SURV.2011.092110.00088

[10] Dias J.A., Rodrigues J.J., Zhou L. (2014); Cooperation advances on vehicular communications: A survey, Vehicular Communications, 1(1), 22-32, 2014. https://doi.org/10.1016/j.vehcom.2013.11.003

[11] Earle T.C. (2010); Trust in risk management: a model-based review of empirical research, Risk Analysis, 30(4), 541-74, 2010. https://doi.org/10.1111/j.1539-6924.2010.01398.x

[12] Gazdar T., Rachedi A., Benslimane A., Belghith A. (2012); A distributed advanced analytical trust model for VANETs, Global Communications Conference (GLOBECOM), 201-206, 2012.

[13] Hartenstein H., Laberteaux L.P. (2008); A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, 46(6), 164-171, 2008. https://doi.org/10.1109/MCOM.2008.4539481

[14] Hanzo L., Tafazolli R. (2007); A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 50-70, 2007. https://doi.org/10.1109/COMST.2007.382407

[15] Khan Pathan A.S. (2010); Security of self-organizing networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2010.

[16] Lee U., Gerla M. (2010); A survey of urban vehicular sensing platforms, Computer Networks, 54(4), 527-44, 2010. https://doi.org/10.1016/j.comnet.2009.07.011

[17] Li F., Wang Y. (2007); Routing in vehicular ad hoc networks: A survey, IEEE Vehicular Technology Magazine, 2(2), 12-22, 2007. https://doi.org/10.1109/MVT.2007.912927

[18] Li W., Song H. (2016); ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, 17(4), 960-9, 2016. https://doi.org/10.1109/TITS.2015.2494017

[19] Minhas U.F., Zhang J., Tran T., Cohen R. (2011); A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks, IEEE Transactions on Systems, Man, and Cybernetics, 41(3), 407-20, 2011. https://doi.org/10.1109/TSMCC.2010.2084571

[20] Momani M., Aboura K., Challa S. (2007); RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks, Intelligent Sensors, Sensor Networks and Information, 2007, 347-352, 2007.

[21] Mali G., Misra S. (2016); TRAST: Trust-Based Distributed Topology Management forWireless Multimedia Sensor Networks, IEEE Transactions on Computers, 65(6), 1978-91, 2016. https://doi.org/10.1109/TC.2015.2456026

[22] Oliveira L.M, Rodrigues J.J.(2011); Wireless Sensor Networks: A Survey on Environmental Monitoring, JCM, 6(2), 143-51, 2011.

[23] Pantazis N.A, Nikolidakis S.A., Vergados D.D. (2013); Energy-efficient routing protocols in wireless sensor networks: A survey, IEEE Communications Surveys and Tutorials, 15(2), 551-91, 2013. https://doi.org/10.1109/SURV.2012.062612.00084

[24] Ren Y., Zadorozhny V.I, Oleshchuk VA, Li F.Y. (2014); A novel approach to trust management in unattended wireless sensor networks, IEEE Transactions on Mobile Computing, 13(7), 1409-23, 2014. https://doi.org/10.1109/TMC.2013.22

[25] Rezende C., Boukerche A., Pazzi R.W., Rocha B.P., Loureiro A.A. (2011); The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011.

The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011. https://doi.org/10.1016/j.jpdc.2010.12.009

[26] Shabut A.M., Dahal K.P., Bista S.K., Awan I.U. (2015); Recommendation based trust model with an effective defense scheme for MANETs, IEEE Transactions on Mobile Computing, 14(10), 2101-15, 2015. https://doi.org/10.1109/TMC.2014.2374154

[27] Tan S., Li X., Dong Q. (2016); A Trust Management System for Securing Data Plane of Ad-Hoc Networks, IEEE Transactions on Vehicular Technology, 65(9), 7579-92, 2016. https://doi.org/10.1109/TVT.2015.2495325

[28] Velloso P.B., Laufer R.P., Cunha D.D., Duarte O.C., Pujolle G. (2010); Trust management in mobile ad hoc networks using a scalable maturity-based model, IEEE Transactions on Network and Service Management, 7(3), 172-85, 2010. https://doi.org/10.1109/TNSM.2010.1009.I9P0339

[29] Yu H., Shen Z., Miao C., Leung C., Niyato D. (2010); A survey of trust and reputation management systems in wireless communications, Proceedings of the IEEE, 98(10), 1755-72, 2010. https://doi.org/10.1109/JPROC.2010.2059690

[30] Zhao S., Aggarwal A., Frost R., Bai X. (2012); A survey of applications of identity-based cryptography in mobile ad-hoc networks, IEEE Communications Surveys and Tutorials, 14(2), 380-400, 2012. https://doi.org/10.1109/SURV.2011.020211.00045

[31] Zhang J. (2011); A survey on trust management for vanets, Advanced Information Networking and Applications, 105-112, 2011.

[32] Zouridaki C, Mark B.L, Hejmo M, Thomas R.K. (2005); A quantitative trust establishment framework for reliable data packet delivery in MANETs, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI: 10.3233/JCS-2007-15102, 1-10, 2005. https://doi.org/10.3233/JCS-2007-15102

[33] Zhang J., Chen C., Cohen R. (2013); Trust modeling for message relay control and local action decision making in VANETs, Security and Communication Networks, DOI: 10.1002/sec.519, 6(1), 1-4, 2013. https://doi.org/10.1002/sec.519
Published
2017-09-10
How to Cite
EL-SAYED, Hesham et al. Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 12, n. 5, p. 612-630, sep. 2017. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/2895>. Date accessed: 23 nov. 2020. doi: https://doi.org/10.15837/ijccc.2017.5.2895.

Keywords

direct trust computations, hybrid trust computations (HTC), heterogeneous distributed networks (HDNs), receiver operating characteristics, recommendation trust computations (RTC)