www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 4 Issue 2 February 2015, Page No. 10396-10399
A Survey of Trust Management using types of Uncertain Reasoning in
Network Environment
Kadiwala shabnam1, Asst.Prof. Swapnil R.Andhariya 2,
1
Department of Computer Science & Engineering,
Parul Institute Of Technology, Limda
kadiwalasabanam@gmail.com
2
Department of Computer Science & Engineering,
Parul Institute Of Technology, Limda
Andhariya.swapnil@gmail.com
Abstract: A unified trust management scheme that enhances the security in MANETs using uncertain reasoning is proposed. In
the proposed scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With
direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain
reasoning when the full probability model can be defined. On the other hand, with indirect observation from neighbor nodes of the
observer node, the trust value is derived using the Dempster-Shafer theory, which is another type of uncertain reasoning when the
proposition of interest can be derived by an indirect method. Performance of a routing protocol including this trust management
scheme is evaluated under attack. Trust management considers the capability of the node along with its behavior while calculating
the trust. Hence the performance of the routing protocol is improved when both behavior and capability is considered for trust
evaluation.
behavior, direct trust can be established. Second, when the
Keywords: MANETS, Trust Management, Uncertain Reasoning.
subject receives recommendations
1. INTRODUCTION
A. Mobile ad hoc network (MANET)
A Mobile ad hoc network is a collection of wireless nodes
that can dynamically be set up anywhere and anytime without
using any pre-existing network infrastructure. It is an
autonomous system in which mobile hosts connected by
wireless links are free to move randomly.[6]
B. The Concept of Trust
Trust concept is important for communication and network
protocol designers when creating trust relationships between
participating nodes. Trust is also defined as degree of belief
about other entities behavior Trust is paramount to ensure
collaborative optimization of system metrics. Define trust as
“a set of relations among entities that participate in a
protocol. Such relations are based on evidence created by
earlier interactions within protocol entities. Generally, if
interactions are faithful to a protocol, then trust is more between
such entities.”[3]
C. Trust Representation
There are two common ways to establish trust in MANETs.
First, when the subject can directly observe the agent’s
from other entities about the agent, indirect trust can be
established. [7]
Direct Trust: It is established upon observations on
whether the previous behavior interactions between the
subject and the agent are successful. That is, the notation
DAB denotes the direct trust values between node A and
Bas shown in Fig.1. [7]
A
B
.
Figure1.Direct Trust [7]
Indirect Trust: Trust can transit through third parties. For
example, if A and B have established a recommendation
trust relationship and B and Y have established a direct trust
relationship, then A can trust Y to a certain degree if B tells
A its trust opinion (i.e. recommendation) about Y. So,
indirect trust is established through trust transitivity as
shown in Figure 2. [7]
A
Kadiwala shabnam IJECS Volume 4 Issue 2 February, 2015 Page No.10396-10399
B
Y
Page 10396
Figure2.Indirect Trust [7]
D. Trust management
Trust Management identified it as a separate component
of security services in networks and clarified that Trust
management provides a unified approach for specifying and
interpreting security policies, relationships, and credentials.”
Trust management has diverse applicability in many decision
making situations including key management, intrusion
detection, authentication, access control, isolating misbehaving
nodes for effective routing, and other purposes. Trust
management includes trust establishment (i.e., collection of
appropriate trust evidence trust generation, trust distribution,
trust discovery, and evaluation of trust evidence), trust update,
and trust revocation. [4]
2. TRUST ORIENTED AD HOC NETWORK
FRAMEWORK: [10]
Trust oriented Ad hoc Framework
Trusted Ad hoc
network
Ad hoc Network
Ad hoc Network set Up
Trust Policy
Trust Model
Trusted Protocol
FIG: 3 Abstract Representation of Trust Oriented
Framework [10]
Ad
Hoc Network
3. LITERATURE SURVEY
Trust
management using, Uncertain Reasoning is a hot
research area now days. With NS2 growing of it development
and social web sites, increasing trends in people to posting online
reviews. There are different tactics for extracting the review, I
look around and survey different methods for it. Choosing the
best one out is depend upon what type of review you want to
summarized.
In[1] Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu
Wang, and Peter Mason, MANETs, including dynamic topology
and open wireless medium, lead to many security weaknesses.
Malicious node scan drop or modify packets that are received
from other nodes and reduce the reliability of networks.
Therefore, secure routing in orithms
MANETs is an important area of research. In this paper, a
scheme that enhances routing security based on trust. In order to
improve the accuracy of trust values with indirect observations,
we use Dempster-Shafer theory of evidence to fuse observers’
opinions. Consequently, a more accurate trust value can be
calculated from indirect observations. And use the trust value to
improve the MANET routing protocol security. Simulation
results indicated the effectiveness of our scheme, which
improves secure throughput and packet delivery ratio
considerably with slightly increased average end-to-end delayto
enhance the MANET routing protocol security. Simulation
results indicated the effectiveness of our scheme, which
improves secure throughput and packet delivery ratio
considerably with slightly increased average end-to-end delay.
In [8] Sonja Buchegger and Jean-Yves Le Boudec, in
this paper a robust reputation system for misbehavior detection
in mobile ad-hoc networks. Solution is based on a modified
Bayesian estimation approach which we designed. In this
approach, everyone maintains a reputation rating and a trust
rating about everyone else who is of interest. The approach is
fully distributed and no agreement is necessary. Speed up the
detection of misbehaving nodes, it is advantageous to,
cautiously, make use also of reputation records from others in
addition to first-hand observations. These records are only
considered in the case when they come from a source that has
consistently been trustworthy or when they pass the deviation test
which evaluates compatibility with one’s own reputation ratings.
Even after passing the test, they only slightly modify the
reputation rating of a node. The results of the deviation test are
additionally used to update the trust rating. It can allow for
redemption and prevent capitalizing excessively on past behavior
by two mechanisms, namely re-evaluation and fading. It has been
argued that traditional statistical approaches so far do not assume
malicious behavior reputation system uses Bayesian estimation
to specifically, address lying nodes. In this paper showed that
method is coping well with false second-hand reports, as it keeps
the number of false positives and false negatives low. Simulation
also showed that the detection of misbehaving nodes accelerates
significantly with the use of selected second-hand information.
In[2]Boyang, Ryo Yamamoto, Yoshiaki Tanaka,In this
paper, a Dempster-Shafer (D-S) evidence based trust
management strategy is proposed to conquer not only
cooperative black hole attack but also gray hole attack. Neighbor
observing model based on watchdog mechanism is used to detect
single black hole attack by focusing on the direct trust value
(DTV). Historical evidence is also taken into consideration to go
against gray hole attacks. Then, a neighbor recommendation
model companied with indirect trust value (ITV) is used to figure
out the cooperative black hole attack. D-S evidence theory is
implemented to combine ITVs from different neighbors. Some of
the neighbor nodes may declare a false ITV, which effect can
also be diminished through the proposed method. The simulation
is firstly conducted in the Matlab to evaluate the performance of
the algorithm. Then the security routing protocol is implemented
in the GloMoSim to evaluate the effectiveness of the strategy.
Both of them show good results and demonstrate the advantages
of proposed method by punishing malicious actions to prevent
Kadiwala shabnam IJECS Volume 4 Issue 2 February, 2015 Page No.10396-10399
Page 10397
the camouflage and deception in the attacks. Black hole attack
and gray hole attack are discussed and two algorithms, NNOMbased DTV and NRTM-based ITV are proposed. The proposed
DTV can be used to detect the gray hole attacks in the networks.
The proposed ITV aims at the recommendation of cheating
neighbor nodes. If there is no such recommendation node or the
cheating nodes are too many, the proposed ITV may not take
effects.
In[7]Wingbow,
HuangChuanhe,
YangWenzhong,
WangTong, in this paper route and forward the data, it is
important to evaluate the individual behavior of each node in
network. Benevolent nodes can keep the network working
smoothly. Malicious nodes present in the network that try to
distort, disrupt or disturb the network traffic. the method of the
trust value computation connected with the behaviors of
communication with its one-hop neighbor nodes reliably, and
integrally, appropriately timed, they establish a trust routing
model to evaluate and maintain trust relationships from the
aspects of direct and indirect trust level to discover a most
trustworthy routing. That the proposed model and algorithm can
detect effectively malicious behaviors, bypass the malicious
nodes, so as to improve the network packet delivery fraction,
routing overhead and decrease the average end-to-end delay.
Distributed trust routing model for ad hoc networks that is highly
reliable, robust and scalable. This analyze the trust model, we
have presented a solution to solve it based on trust graph. We
implement the algorithm: an extension to AODV: IBTR in NS2.
Better performance on the packer delivery, routing overhead and
average end-to-end delay under varying the different number of
malicious nodes. This model can serve as the network layer
complement for network security solutions such as IDS schemes
or secure routing protocols for ad hoc networks.
In[5]N. Marchang,R. Datta, In this study, the authors
present a light-weight trust-based routing protocol. It is lightweight in the sense that the intrusion detection system (IDS) used
for estimating the trust that one node has for another, consumes
limited computational resource. Moreover, it uses only local
information thereby ensuring scalability. Our light-weight IDS
takes care of two kinds of attacks, namely, the black hole attack
and the grey hole attack. Whereas our proposed approach can be
incorporated in any routing protocol, the authors have used
AODV as the base routing protocol to evaluate our proposed
approach and give a performance analysis. The trust a node has
for a neighbor forms the basic building block of our trust model.
The proposed trust estimation technique, which is executed by
every node in the network independently, uses only local
information thereby making it scalable. Moreover, unlike other
techniques based on monitoring traffic that require a lot of space
and time for buffering packets and searching for a packet match,
our approach does not require such an overhead. Moreover, we
presented two variants of the proposed approach. Depending
upon one’s priority and need, a variant can be chosen.
Simulation results illustrate the effectiveness of our approach. It
is seen that the RF in LTB-AODV is less than that of AODV for
all cases The routes (most trusted) established in LTB-AODV
would potentially be longer than those (shortest routes)
established in AODV When a route is established between a
source and a destination, all the intermediate nodes in between
them have also consequently established the routes to the source
and the destination.
In[9]Meenakshi Bansal, Rachna Raj put and Gaurav
Gupta, Nodes in Wireless ad hoc network need to operate as
routers in order to maintain the information about network
connectivity as there is no centralized infrastructure. Therefore,
Routing Protocols are required which could adapt dynamically to
the changing topologies and works at low data rates. As a result,
there arises a need for the comprehensive performance
evaluation of the ad -hoc routing protocols in s a me frame work
to understand their comparative merits and suitability or
deployment in different scenarios. In this paper the protocols
suite selected for comparison are AODV, DSR, TORA and
OLSR ad- hoc routing protocols, as these were the most
promising from all other protocols. The performance of these
protocols is evaluated through exhaustive simulation sing the
OPNET Modeler network simulator under. different parameter s
like routing overhead, delay, throughput and network load under
varying the mobile nodes.
Routing Overhead
Ad hoc networks are designed to be scalable. As the
network grows, various routing protocols perform differently.
The amount of routing traffic increases as the
network grows. An important measure of the scalability of the
protocol, and thus the network, is its routing overhead. It is
defined as the total number of routing packets transmitted over
the network, expressed in bits per second or packets per second.
Packet End-to-End Delay
The packet end-to-end delay is the average time that
packets take to traverse the network. This is the time from the
generation of the packet by the sender up to their reception at the
destination’s application layer and is expressed in seconds. It
therefore includes all the delays in the network such as buffer
queues, transmission time and delays induced by routing
activities and MAC control exchanges. The delay is also affected
by high rate of CBR packets. The buffers become full much
quicker, so the packets have to stay in the buffers a much longer
period of time before they are sent.
Throughput
The amount of throughput in all cases is highest for
OLSR as compared with other protocols as routing paths are
readily available for the data to be sent from source to
destination. The amount of throughput for TORA is higher at
start from AODV and DSR in case of 10 and 30 nodes but it fall
below AODV throughput curve as the nodes start moving.
AODV performs better in network with relatively high number
of traffic sources and higher mobility. The DSRs throughput is
very low in the network in all the cases.
4. CONCLUSION
After studying some papers related to trust management for
uncertain reasoning, it is very help full in the field of MANET.
Evaluate the trust values of observed nodes in MANETs.
Misbehaviors such as dropping or modifying packets can be
Kadiwala shabnam IJECS Volume 4 Issue 2 February, 2015 Page No.10396-10399
Page 10398
detected in scheme through trust values by direct and indirect
observation. Nodes with low trust values will be excluded by the
routing algorithm. The main goal of more accurate trust can be
obtained by considering different types of packets, indirect
observation from one-hop neighbors and other important factors
such as buffers of queues and states of wireless connections,
which may cause dropping packets in friendly nodes. Improve
the throughput, packet delivery ratio, delay and Routing load.
REFERENCES
[1] Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang,
and Peter Mason”Trust Establishment with Data Fuion for
Secure Routing in MANETs”, IEEE ICC 2014.
Kadiwala shabnam received the B.E degree in Computer
Science and Engineering from Shri S’ vidya Mandal Institute of
Technology in 2013. She is receiving M.E. degree in Computer
Science and Engineering from Parul Institute Of Technology,
Gujarat Technological University,Ahmedabad
[2] BOYANG,
Ryo
YAMAMOTO,
Yoshiaki
TANAKA,”Dempster-Shafer Evidence Theory Based Trust
Management Strategy against Cooperative Black Hole
Attacks and Gray Hole Attacks in MANETs”, ICAC,2013.
[3] Menaka, Dr. V. Ranganathan “A Survey of Trust related
Routing Protocols for Mobile Ad Hoc Networks”,R.,
IJETAE.com, April 2013
[4] Jin-Hee Cho, Member, Ananthram Swami, Fellow,and IngRay Chen, Member, “A Survey on Trust Management for
Mobile Ad Hoc Networks”, IEEE,2011.
[5] N.Marchang,R. Datta, “Light-weight trust-based routing
protocol for mobile ad hoc networks”, IETDL.org,2010.
[6] sanket.b.radder
networks”,2010
“Challenges
in
mobile
ad-hoc
[7] Huang Chuanhe, Yang Wenzhong, WangTong, ”An
Individual Behavior-based Trust Routing Model for Ad hoc
Networks” Wingbow, IEEE 2009.
[8] S. Buchegger and J.-Y. L. Boudec, “A robust reputation
system for P2P and mobile ad-hoc networks,” in Proc. 2nd
Workshop on the Economics of Peer-to-Peer Systems,
(Bologna, Italy), Nov. 2004
[9] S. Corson and J. Macker, “Mobile ad hoc networking
(MANET): routing protocol performance issues and
evaluation considerations,” IETF RFC 2501, Jan. 1999.
[10] Amandeep Verma and Manpreet Singh Gujral,”Trust
Oriented Security Framework For Ad Hoc Network”, pp.
19–26, © CS & IT-CSCP 2012.
Author Profile
Kadiwala shabnam IJECS Volume 4 Issue 2 February, 2015 Page No.10396-10399
Page 10399
Kadiwala shabnam IJECS Volume 4 Issue 2 February, 2015 Page No.10396-10399
Page 10400
Download