Presentation is loading. Please wait.

Presentation is loading. Please wait.

Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.

Similar presentations


Presentation on theme: "Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017."— Presentation transcript:

1 Recommendation Based Trust Model with an Effective Defense Scheme for ManetS
Adeela Huma 02/02/2017

2 Introduction - MANETs MANETs- Mobile ad hoc networks
lacks infrastructure and central authority to establish and facilitate communication in the network composed of a set of autonomous devices that work as network nodes agreeing to relay packets for each other and have dynamic topologies, with resource constraints, and limited physical security formation and sustained existence of MANET services are mainly based on an individual node’s cooperation in packet forwarding.

3 Introduction – Trust Management in MANETs
Vulnerable to misbehaving Nodes Trust in MANETs is the opinion held by one node (known as evaluating node) about another node (known as evaluated node), based upon the node’s past behavior and recommendations from other nodes (known as recommending nodes) in the network. Trust Management Frameworks: Direct interaction Direction interaction and recommendation Challenges

4 Related Work CONFIDANT CORE RESTrust Soltani et al. Li et al.
deviation test only accepts negative recommendations CORE only accepts positive recommendations RESTrust Fuzzy recommendation similarity Soltani et al. Trust based on direct observation and recommendation Li et al. Uses confidence value Hermes et al. Use acceptability threshold in relation to confidence value Velloso et al. Relation maturity (longer term associates recommendations are weighed higher) Yu et al. Clustering technique to filter out trustworthy recommendations from untrustworthy ones

5 Types of Attacks

6 The Proposed Model

7 The Proposed Model Trust Computation Component
uses direct as well as indirect (second hand) trust information. Recommendation Manager Component requests and gathers recommendations for a node from a list of recommending nodes Cluster Manager Component filters out dishonest recommendations from the list and sends out a list of trustworthy recommendations to the manager component.

8 Trust Computation Component
Bayesian statistical approach is used in for computing trust values based on the assumption that they follow a beta probability distribution. Alpha – forwarding packets (+ve observation) Beta – dropped packets (-ve observation) Cold-start problem Set initial constant value of trust Data Sparsity problem Uses nearest neighbor clustering technique to assign ratings and reduce the sparsity

9 Trust Computation Component
Direct trust Obtains direct trust value from two nodes that have already initiated a trust relationship. Decay factor - Change in influence over time Additional new interaction (+ve/-ve) at time t i+1 No observed interaction at time t i+1

10 Trust Computation Component
Indirect Trust – no previous trust relationship the direct observations obtained by one node about its neighbors which can be used by another node as second-hand information. It can be vulnerable to dishonest recommendation Total trust Tij is calculated by combing both direct and indirect trust values with different weights:

11 Recommendation Manager
Recommendation manager in the proposed model works as an intermediate component between indirect trust computation and cluster manager components. Recommendation manager has three important roles: 1) send recommendation request to the evaluating node’s neighbors; (2) collect received recommendation and send it to the cluster manger which runs the filtering procedure; (3) receive the filtered recommendation and send it back to the trust computation component.

12 Clustering Criteria Nodes are clustered based on three values namely:
confidence value deviation value closeness value

13 Clustering Criteria – Confidence Value
can be used to solve the problem of short-term and long-term observations Confidence value starts from 0 in case of no observations between nodes Nodes with higher confidence value are desirable Nodes with high confidence in the early rounds are more likely to be attackers confidence value is computed as the variance of the beta distribution

14 Clustering Criteria – Confidence Value
Proposed model vs TMUC model confidence value comparison

15 Clustering Criteria – Deviation Value
represents to what extent the received recommendation is compatible with the personal experience of evaluating node. Each node compares received recommendation with its own first-hand information and accepts only those not deviating too much from self-observations. In case of missing historical interaction with evaluated node, the proposed method compares the confidence level of the evaluating node with that of the recommending node.

16 Clustering Criteria – Deviation Value
The deviation test is only applied if both nodes have similar level of confidence. Deviation value Vijdev is calculated as :

17 Clustering Criteria – Closeness Value
uses the concept of closeness centrality between the evaluating nodes and the recommending node from the social trust closeness centrality is a measure of the distance between the evaluating node and the recommending node close nodes are likely to possess same nature and counter nearly same environmental and operational conditions over a period of time in the network trust values for the close neighbours converge to nearly same level. This may help in recognizing the untrustworthy recommending node whose recommendation is much different from the close recommending nodes

18 Clustering Criteria – Closeness Value
Closeness value Vcloseij refers to the degree of node i’s closeness to a recommending node k at time t:

19 Cluster Manager receives a list of recommendations from the recommendation manager and processes it using a clustering technique. Clustering algorithm is run by the evaluating node on all the recommendations in the list A vector of three values (Vconf, Vdev, Vclose) is provided by a recommending node for the clustering operation. Divides vectors into pre defined number of clusters.

20 Clustering Algorithm

21 Cost of Defense Scheme proposed defense scheme is lightweight
only recommendation request and reply packets are used to send and receive a list of recommendations. Data size and length – (3 parameters: positive and negative observations and current position) On demand scheme Cost: Complexity Memory consumption Time consumption

22 Simulation Simulation is conducted using NS2 simulator
Network with 50 mobile nodes in an area of 700*700 square meters Bad mouthing , ballot stuffing attacks is used 15 source–destination nodes

23 Performance Evaluation
Performance of network is represented by two parameters: Network Throughput Packet Loss It is evaluated in the presence of bad-mouthing, ballot stuffing and selfish nodes

24 Performance Evaluation -Throughput

25 Performance Evaluation – Packet Loss

26 Performance Evaluation – Indirect Trust

27 Performance Evaluation – Bad mouthing attack

28 Performance Evaluation – Ballot-Stuffing attack

29 Performance Evaluation- Disabling confidence, deviation, closeness

30 Performance Evaluation- comparison with maturity model

31 Conclusion/Main Idea of Paper
Proposes a recommendation based trust model with a defence scheme to filter out attacks related to dishonest recommendations like bad-mouthing, ballot-stuffing, and collusion for mobile ad hoc networks. The recommending node is chosen based on three factors to check its honesty: number of interactions with the evaluated node, unity of view with the evaluating node for solving the problem of the scarcity of knowledge, closeness to the evaluating node.

32 Thank you!


Download ppt "Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017."

Similar presentations


Ads by Google