Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs
Keywords:
direct trust computations, hybrid trust computations (HTC), heterogeneous distributed networks (HDNs), receiver operating characteristics, recommendation trust computations (RTC)Abstract
In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address the security issues in HDNs. These techniques utilize too many resources, resulting in higher network overheads. This being classified under light weight security scheme, the Trust Management System (TMS) tends to be one of the most promising technology, featured with more efficiency in terms of availability, scalability and simplicity. It advocates both the node level validation and data level verification enhancing trust between the attributes. Further, it thwarts a wide range of security attacks by incorporating various statistical techniques and integrated security services. In this paper, we present a literature survey on different TMS that highlights reliable techniques adapted across the entire HDNs. We then comprehensively study the existing distributed trust computations and benchmark them in accordance to their effectiveness. Further, performance analysis is applied on the existing computation techniques and the benchmarked outcome delivered by Recommendation Trust Computations (RTC) is discussed. A Receiver Operating Characteristics (ROC) curve illustrates better accuracy for Recommendation Trust Computations (RTC), in comparison with Direct Trust Computations (DTC) and Hybrid Trust Computations (HTC). Finally, we propose the future directions for research and highlight reliable techniques to build an efficient TMS in HDNs.
References
Babu S.S., Raha A., Naskar M.K. (2011); Geometric mean based trust management system for WSNs (GMTMS), Information and Communication Technologies (WICT), 444-449, 2011.
Bao F., Chen R., Chang M., Cho J.H. (2012); Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Transactions on Network and Service Management, 9(2), 69-83, 2012.
Baronti P., Pillai P., Chook V.W., Chessa S., Gotta A., Hu Y.F. (2007); Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards, Computer communications, 30(7), 1655-1695, 2007. https://doi.org/10.1016/j.comcom.2006.12.020
Chen Y.M., Wei Y.C. (2013); A beacon-based trust management system for enhancing user centric location privacy in VANETs, Journal of Communications and Networks, 15(2), 153-63, 2013. https://doi.org/10.1109/JCN.2013.000028
Chaurasia B.K., Verma S., Tomar G.S. (2013); Trust computation in VANETs, 2013 International Conference on Communication Systems and Network Technologies (CSNT), 468-471, 2013.
Chang B.J., Kuo S.L. (2009); Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs, IEEE Transactions on Vehicular Technology, 58(4), 1846-63, 2009. https://doi.org/10.1109/TVT.2008.2005415
Cho J.H., Swami A., Chen R. (2012); Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks, Journal of Network and Computer Applications, 35(3), 1001-12, 2012. https://doi.org/10.1016/j.jnca.2011.03.016
Conti M., Giordano S. (2014); Mobile ad hoc networking: milestones, challenges, and new research directions, IEEE Communications Magazine, 52(1), 85-96, 2014. https://doi.org/10.1109/MCOM.2014.6710069
Cho J.H., Swami A., Chen R. (2011); A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 13(4), 562-83, 2011. https://doi.org/10.1109/SURV.2011.092110.00088
Dias J.A., Rodrigues J.J., Zhou L. (2014); Cooperation advances on vehicular communications: A survey, Vehicular Communications, 1(1), 22-32, 2014. https://doi.org/10.1016/j.vehcom.2013.11.003
Earle T.C. (2010); Trust in risk management: a model-based review of empirical research, Risk Analysis, 30(4), 541-74, 2010. https://doi.org/10.1111/j.1539-6924.2010.01398.x
Gazdar T., Rachedi A., Benslimane A., Belghith A. (2012); A distributed advanced analytical trust model for VANETs, Global Communications Conference (GLOBECOM), 201-206, 2012.
Hartenstein H., Laberteaux L.P. (2008); A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, 46(6), 164-171, 2008. https://doi.org/10.1109/MCOM.2008.4539481
Hanzo L., Tafazolli R. (2007); A survey of QoS routing solutions for mobile ad hoc networks, IEEE Communications Surveys and Tutorials, 9(2), 50-70, 2007. https://doi.org/10.1109/COMST.2007.382407
Khan Pathan A.S. (2010); Security of self-organizing networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2010.
Lee U., Gerla M. (2010); A survey of urban vehicular sensing platforms, Computer Networks, 54(4), 527-44, 2010. https://doi.org/10.1016/j.comnet.2009.07.011
Li F., Wang Y. (2007); Routing in vehicular ad hoc networks: A survey, IEEE Vehicular Technology Magazine, 2(2), 12-22, 2007. https://doi.org/10.1109/MVT.2007.912927
Li W., Song H. (2016); ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, 17(4), 960-9, 2016. https://doi.org/10.1109/TITS.2015.2494017
Minhas U.F., Zhang J., Tran T., Cohen R. (2011); A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks, IEEE Transactions on Systems, Man, and Cybernetics, 41(3), 407-20, 2011. https://doi.org/10.1109/TSMCC.2010.2084571
Momani M., Aboura K., Challa S. (2007); RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks, Intelligent Sensors, Sensor Networks and Information, 2007, 347-352, 2007.
Mali G., Misra S. (2016); TRAST: Trust-Based Distributed Topology Management forWireless Multimedia Sensor Networks, IEEE Transactions on Computers, 65(6), 1978-91, 2016. https://doi.org/10.1109/TC.2015.2456026
Oliveira L.M, Rodrigues J.J.(2011); Wireless Sensor Networks: A Survey on Environmental Monitoring, JCM, 6(2), 143-51, 2011.
Pantazis N.A, Nikolidakis S.A., Vergados D.D. (2013); Energy-efficient routing protocols in wireless sensor networks: A survey, IEEE Communications Surveys and Tutorials, 15(2), 551-91, 2013. https://doi.org/10.1109/SURV.2012.062612.00084
Ren Y., Zadorozhny V.I, Oleshchuk VA, Li F.Y. (2014); A novel approach to trust management in unattended wireless sensor networks, IEEE Transactions on Mobile Computing, 13(7), 1409-23, 2014. https://doi.org/10.1109/TMC.2013.22
Rezende C., Boukerche A., Pazzi R.W., Rocha B.P., Loureiro A.A. (2011); The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011.
The impact of mobility on mobile ad hoc networks through the perspective of complex networks, Journal of Parallel and Distributed Computing, 71(9), 1189-200, 2011. https://doi.org/10.1016/j.jpdc.2010.12.009
Shabut A.M., Dahal K.P., Bista S.K., Awan I.U. (2015); Recommendation based trust model with an effective defense scheme for MANETs, IEEE Transactions on Mobile Computing, 14(10), 2101-15, 2015. https://doi.org/10.1109/TMC.2014.2374154
Tan S., Li X., Dong Q. (2016); A Trust Management System for Securing Data Plane of Ad-Hoc Networks, IEEE Transactions on Vehicular Technology, 65(9), 7579-92, 2016. https://doi.org/10.1109/TVT.2015.2495325
Velloso P.B., Laufer R.P., Cunha D.D., Duarte O.C., Pujolle G. (2010); Trust management in mobile ad hoc networks using a scalable maturity-based model, IEEE Transactions on Network and Service Management, 7(3), 172-85, 2010. https://doi.org/10.1109/TNSM.2010.1009.I9P0339
Yu H., Shen Z., Miao C., Leung C., Niyato D. (2010); A survey of trust and reputation management systems in wireless communications, Proceedings of the IEEE, 98(10), 1755-72, 2010. https://doi.org/10.1109/JPROC.2010.2059690
Zhao S., Aggarwal A., Frost R., Bai X. (2012); A survey of applications of identity-based cryptography in mobile ad-hoc networks, IEEE Communications Surveys and Tutorials, 14(2), 380-400, 2012. https://doi.org/10.1109/SURV.2011.020211.00045
Zhang J. (2011); A survey on trust management for vanets, Advanced Information Networking and Applications, 105-112, 2011.
Zouridaki C, Mark B.L, Hejmo M, Thomas R.K. (2005); A quantitative trust establishment framework for reliable data packet delivery in MANETs, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI: 10.3233/JCS-2007-15102, 1-10, 2005. https://doi.org/10.3233/JCS-2007-15102
Zhang J., Chen C., Cohen R. (2013); Trust modeling for message relay control and local action decision making in VANETs, Security and Communication Networks, DOI: 10.1002/sec.519, 6(1), 1-4, 2013. https://doi.org/10.1002/sec.519
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.