Download Outline - UF CISE - University of Florida

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Backpressure routing wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Distributed operating system wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

CAN bus wikipedia , lookup

Everything2 wikipedia , lookup

Kademlia wikipedia , lookup

Transcript
A reputation based recommendation
system over trusted nodes(iTrust)
 Chirag Gupta
 Isha Agarwal
 Avinash Kautham
Outline
1.
2.
3.
4.
5.
6.
7.
Introduction
Query information – Two approaches
On Demand Approach
Exchange Trust List approach
Advantages and Disadvantages of each
Evaluation Metrics
Results (expected)
Introduction
 Need of trust in MANET
 Lack of infrastructure leads to the greater possibility of
presence of malicious nodes in MANETs.
 This becomes a psychological barrier for users in
communicating Peer to Peer in MANETs
 Establishing trust between known users will help to
break this barrier.
Related work
 iTrust – Encounter Based Trust[1]
 Location Vector, Duration Vector
 Bayesian based approach[2]
 Uses first hand observation and propagate this
information over the network
 SVM based approach[6]
 Uses machine learning approaches to train network with
all possible attack scenarios.
New Node recommendation
Yes
Scanning
New node detected
Do you know(trust) this guy ?
New node is
Recommended
Yes
Query information for new node
 Two Approaches
 Exchange trust-list Approach


Global Model
Uno Model
 On Demand Approach


Global Model
Uno Model
Two phases
 Scanning phase
 Scans all the mobile devices around the user using
bluetooth.
 Nodes found either be already TRUSTED node or
UNTRUSTED(new) Node.
 Score Calculation phase
 Trust score calculation for each new node.
 If trust score is greater than a threshold, new node is
recommended.
General Problems/Challenges
 How to query new node information to trusted node ?
 Once you get the information how to calculate the trust
score ?
 How to decide on threshold (minimum) score needed
for recommendation ?
 What if a particular user does not want to reveal its trust
list ?? (Privacy issues)
Calculation
 Global Model:
TSg n,u = ∑(TS ri,u * TSn,ri ) / N ∀ i = 1..N
 Uno Model:
TSn,u=PFr * PFn * REPr * TSr,u*TSn,r
On-Demand Query
 When a new node is encountered, all trusted nodes
present in the vicinity are queried for this new node.
 Privacy factor of new node and the recommender node
is considered.
 Calculation for trust score.
 TSn,u=PFr * PFn * REPr * TSr,u*TSn,r(Selfish model)
 Two approaches for how to get information of new
node
 GLOBAL model

Query every trusted node in vicinity.

Calculate the trust score for new from each trusted
node and take average of them.
 Uno model

Query the nodes in order.

Order can be decided on any one of below parameter.
 Higher Trust score
 Higher reputation ratings .
 Combination of both .

As soon as it finds new node in a trusted node’s trust list and
its calculate trust score is greater that threshold its
recommended.
Exchange Trust Lists Approach
 Trusts lists are exchanged between trusted users.
 Every user maintains its own trust list and a trust list
corresponding to every node present in its trust list.
 When a new node encountered user queries to the
trust lists maintained by itself.
 Calculate the trust score of the new node found and
recommend if greater than threshold.
Design Issues – Exchange Trust lists
 How to maintain the trust lists data ( Format )
 When do we exchange the trust list ??
 When to update the trusts lists ??
Exchange Method – When and How?
 Two possibilities
 When user adds a node to his trust, its trust list is
transferred.

Problems :- What if trusted node is not around ?
Transfer is not possible.
 Whenever user encounters a trusted node, trusts
lists are transferred or updated. ( after trust is
established)

Problems:- Most likely user will encounter trusted
nodes more often. Trusts lists keep updating (
Overhead ).
Overcoming issues (After List is got..)
 User keeps a list for every node.
 So user will maintain the recommender node id, its
trust list nodes and trust score.
Eg: Trust list of Node 2 (3 – 0.6, 4 – 0.5)  Node 1.
Node 1 will have : 2 3 0.6
2 4 0.5
 So, every node will have original trust list ( with
existing filters) TL org, trust list (our approach) TL new,
list of exchanged trusted nodes Lex.
 In the case of the approaches, storage will be slightly
different, there will just be a 1-1 mapping in the case of
Uno model here.
 Eg: Node 1 TL org
2 0.4
3 0.6
Node 1 Lex
2 4 0.5
2 5 0.4
3 4 0.3
 There will be duplicates in the case of the Global
Model because we need to get information from all the
trusted nodes, but NO DUPLICATES in case of Uno
model.
 Eg: Node 1 Tlorg(id,trust,rep)
2 0.4 0.5
3 0.6 0.4
Node 1 Lex
(2)/3 4 (0.5)/0.3
2
5 0.4
 Which value will you choose ? (Uno model)
 2 because it has higher reputation ?
 3 because it has higher trust ?
 3 because it has higher combined trust(rep*trust) ?
Overall Steps
 Establish trust list with the existing filters (iTrust)
 Scanning around
 Follow any one of the approaches for getting the trust
score and recommendation
 Add to the secondary Trust list maintained.
On-Demand Approach
 Disadvantages
 What if there is no new node in vicinity ?
 Overhead as every time new node is encountered its
queried over MANET.
 Advantages
 Minimal storage required in terms of storing trust list.
 If node density of MANET is high this simple approach
is expected to work better.
Exchange Trust-list
 Advantages:
 Works when there is no trusted node around.
 Network traffic is lesser or packets transmitted per
request is lesser.
 Disadvantages
 Lot of memory is required.
 Update of trust is very costly because after trust list is
exchanged, if user changes value of trust then it needs to be
updated.
[ need to periodically exchange list – Timestamp]
 More vulnerable to network security issues because
more information is sent over the network about the
trust list of a node.
 There can be a node which keeps asking or monitoring
all the other nodes without giving information.
Evaluation Metrics
 Epidemic Routing[1]
 Unreachability
 Overhead
 Delay
Results (expected):
 Global Model has more overhead and delay than
Selfish Model
 The Exchange trust-list will perform better when node
density is less in a particular area.
 The On-Demand approach will perform better when
node density is higher.
References
 [1] "Proximity based Trust-Advisor using encounters for Mobile Societies:
Analysis of four Filters" - Udayan Kumar, Gautam Thakur and Ahmed Helmy
Department of Computer and Information Science and Engineering,
University of Florida, FL, U.S.A.
(http://www.cise.ufl.edu/~gsthakur/docs/proximity.pdf)
[2] "A Robust Reputation System for Mobile Ad-hoc Network"
- Sonja Buchegger, Jean-Yves Le Boudec EPFL-IC-LC
(http://mescal.imag.fr/membres/corinne.touati/Sandra/robust_report.pdf)
 [3] “ A Reputation-based Scheme against Malicious Packet Dropping for
Mobile Ad Hoc Networks “ -Song JianHua, Ma ChuanXiang
School of Mathematics and Computer Science, Hubei University, Wuhan
430062, Hubei, China
(http://ieeexplore.ieee.org.lp.hscl.ufl.edu/stamp/stamp.jsp?tp=&arnumber=59
35316 )
References
 [4] “ Trust Modelling and Evaluation in Ad-hoc Networks
“- Yan Sun,Wei Yu, Zhu Han and K.J.Ray Liu
(http://www.ele.uri.edu/nest/paper/Globecom05Trust_fin
al.pdf )
 [5] “ DEFENDING AGAINST MALICIOUS NODES USING AN SVM
BASED REPUTATION SYSTEM “ -Rehan Akbani, Turgay Korkmaz,
and G. V. S. Raju
University of Texas at San Antonio San Antonio,TX, USA