The Community for Technology Leaders
RSS Icon
Issue No.07 - July (2010 vol.9)
pp: 1035-1048
Feng Li , Indiana University-Purdue University, Indianapolis
Jie Wu , Temple University, Philadelphia
Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include uncertainty in the reputation system. Specifically, we define a new uncertainty model to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information affects uncertainty in nodes' opinions. After defining a way to reveal and compute the uncertainty in trust opinions, we exploit mobility, one of the important characteristics of MANETs, to efficiently reduce uncertainty and to speed up trust convergence. Two different categories of mobility-assisted uncertainty reduction schemes are provided: the proactive schemes exploit mobile nodes to collect and broadcast trust information to achieve trust convergence; the reactive schemes provide the mobile nodes methods to get authenticated and bring their reputation in the original region to the destination region. Both of the schemes offer a controllable trade-off between delay, cost, and uncertainty. Extensive analytical and simulation results are presented to support our uncertainty model and mobility-assisted reduction schemes.
Authentication, mobile ad hoc networks, mobility, proactive, reactive, reputation, trust, uncertainty, vouching.
Feng Li, Jie Wu, "Uncertainty Modeling and Reduction in MANETs", IEEE Transactions on Mobile Computing, vol.9, no. 7, pp. 1035-1048, July 2010, doi:10.1109/TMC.2010.44
[1] S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The Eigentrust Algorithm for Reputation Management in P2P Networks," Proc. Int'l Conf. World Wide Web, 2003.
[2] A. Josang, "An Algebra for Assessing Trust in Certification Chains," Proc. Network and Distributed Systems Security Symp. (NDSS '99), 1999.
[3] A. Josang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[4] W. Zhang, S. Das, and Y. Liu, "A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks," Proc. Ann. IEEE Comm. Soc. Sensor and Ad Hoc Comm. and Networks, 2006.
[5] S. Buchegger and J. Boudec, "Performance Analysis of the Confidant Protocol," Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing, 2002.
[6] P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP TC6/TC11 Sixth Joint Working Conf. Comm. and Multimedia Security, 2002.
[7] S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad Hoc Networks," Technical Report cs.NI/0307012, Stanford Univ., 2003.
[8] S. Buchegger and J. Boudec, "A Robust Reputation System for P2P and Mobile Ad-Hoc Networks," Proc. Workshop Economics of Peer-to-Peer Systems (P2PEcon), 2004.
[9] M. Carbone, M. Nielsen, and V. Sassone, "A Formal Model for Trust in Dynamic Networks," Proc. IEEE Int'l Conf. Software Eng. and Formal Methods (SEFM '03), 2003.
[10] A. Josang, S. Marsh, and S. Pope, "Exploring Different Types of Trust Propagation," Proc. Int'l Conf. Trust Management, 2006.
[11] A. Josang and S. Pope, "Normalising the Consensus Operator for Belief Fusion," Proc. Int'l Conf. Information Processing and Management of Uncertainty, July 2006.
[12] T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002.
[13] J. Wu and F. Dai, "Mobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2004.
[14] J. Wu, S. Yang, and F. Dai, "Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 6, pp. 735-748, June 2007.
[15] S. Capkun, M. Cagalj, and M. Srivastava, "Securing Localization with Hidden and Mobile Base Stations," Proc. IEEE INFOCOM, 2006.
[16] S. Capkun, J. Hubaux, and L. Buttyán, "Mobility Helps Security in Ad Hoc Networks," Proc. ACM MobiHoc, June 2003.
[17] W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, 2005.
[18] F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs," Proc. IEEE INFOCOM, 2007.
[19] W. Zhao, M. Ammar, and E. Zegura, "A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks," Proc. MobiHoc, 2004.
[20] M. Grossglauser and D. Tse, "Mobility Increases the Capacity of Ad-Hoc Wireless Networks," Proc. IEEE INFOCOM, 2001.
[21] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing, 2005.
[22] A. Vahdat and D. Becker, "Epidemic Routing for Partially-Connected Ad Hoc Networks," technical report, Duke Univ., 2000.
[23] W. Zhao, M. Ammar, and E. Zegura, "Controlling the Mobility of Multiple Data Transport Ferries in a Delay-Tolerant Network," Proc. IEEE INFOCOM, 2005.
[24] J. Newsome, E. Shi, D.X. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Int'l Symp. Information Processing in Sensor Networks, 2004.
[25] J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung, "Fourth Factor Authentication: Somebody You Know," Proc. Conf. Computer and Comm. Security, 2006.
[26] T. Cover and J. Thomas, Elements of Information Theory. Wiley Interscience, 1991.
[27] D. Zhou and J. Wu, "Survivable Multi-Level Ad-Hoc Group Operations," Proc. Int'l Workshop Mobile and Wireless Networks, 2003.
[28] J. Yu and P. Chong, "A Survey of Clustering Schemes for Mobile Ad Hoc Networks," IEEE Comm. Surveys and Tutorials, vol. 7, no. 1, pp. 32-48, 2005.
[29] J. Wu, F. Dai, M. Gao, and I. Stojmenovic, "On Calculating Power-Aware Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks," J. Comm. and Networks, vol. 4, no. 1, pp. 59-70, 2002.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool