Trust and Reputation in Mobile Environments
Trust and Reputation in Mobile Environments
1/41
Contents
1
2
3
4
5
7
8
9
Introduction
Social perspective
Trust in MANETs and WSNs
Overview of Reputation and Trust Based Systems
Components of Reputation and Trust Based Systems
Information Gathering
Information Sharing
Information Modelling
Decision Making
Examples of Reputation and Trust-based Systems
Core
Confidant
Open problems
Conclusions
Bibliography
2/41
5/41
Trust means that the trustor believes in, and is willing to depend
on, the trustee. Theory of reasoned action trusting beliefs and
trusting intention.
Trusting beliefs multidimensional, representing ones beliefs
that the trustee is likely to behave in a way that is benevolent,
competent, honest, or predictable in a situation. Most frequently:
competence, benevolence, and integrity.
Trusting intention is the extent to which one is willing to depend
on the other person in a given situation.
6/41
7/41
8/41
MANET - Problems
9/41
WSN - Problems
10/41
Misbehaviour of nodes
12/41
System goals
13/41
Properties
14/41
Properties
15/41
Initialization
Reputation and trust-based systems can be initialized in one of the
following presented ways:
1
Classification
Classification of such systems can be done based on the following
criteria:
1
.
17/41
18/41
Information Gathering
19/41
Information Sharing
Information Sharing- concerned with dissemination of first-hand
information gathered by nodes.
Information can be shared among nodes in the following ways:
friends list, blacklist, and reputation table.
For sharing information, three important issues have to be
addressed:
1
20/41
Information Modelling
21/41
Decision Making
22/41
Core - About
A Collaborative Reputation Mechanism to enforce node
co-operation in Mobile Ad hoc Networks.
a distributed, symmetric reputation model
uses first-hand and second-hand information for updating
reputation values.
uses bi-directional communication symmetry and dynamic
source routing (DSR) protocol for routing.
assumes wireless interfaces that support promiscuous mode
operation
nodes members of a community have to contribute on a
continuing basis to remain trusted, else reputation will
degrade until eventually they are excluded from the network.
each node: a watchdog mechanism for promiscuous
observation.
23/41
Core - About
addresses only the selfish behaviour problem.
reputation formed and updated along time subjective
reputation, indirect reputation, and functional reputation
past observations are more important than the current
observations.
two types of protocol entities, requester (ask execution of
function f ) and provider (execute f )
use of reputation table (RT), with one RT for each function:
unique ID, recent subjective reputation, recent indirect
reputation, and composite reputation for a predefined
function. RTs are updated in two situations: during the
request phase and during the reply phase.
24/41
25/41
26/41
27/41
28/41
Core - Discussion
1
29/41
Confidant - About
Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks.
inspired by The Selfish Gene by Dawkins which states
reciprocal altruism is beneficial for every ecological system
when favors are returned simultaneously because of instant
gratification.
main purpose: make misbehaviour unattractive in MANETs
based on selective altruism and utilitarianism.
distributed, symmetric reputation model which uses both
first-hand and second-hand information for updating
reputation values.
aims to detect and isolate misbehaving nodes
for routing: used DSR
assumes that no tamper-proof hardware is required for
itselfother nodes to modify their values.
30/41
Confidant - Components
Confidant has four components at each node: Monitor, Trust
Manager, Reputation System, and Path Manager.
31/41
32/41
33/41
34/41
35/41
Confidant - Discussions
36/41
Confidant - Discussions
37/41
Reputation and trust-based systems are still in the first phase when
it comes to MANETs and WSNs current open problems:
the bootstrap problem.
intelligent adversary strategies.
38/41
39/41
Bibliography
Reputation and Trust-based Systems for Ad Hoc and Sensor
Networks, Avinash Srinivasany, Joshua Teitelbaumy, Huigang
Liangz, Jie Wuy and Mihaela Cardeiy
A Survey on Reputation and Trust-Based Systems for
Wireless Communication Networks, Jaydip Sen
Trust and Reputation Systems for Wireless Sensor Networks,
Rodrigo Roman, M. Carmen Fernandez-Gago, and Javier
Lopez
Performance Analysis of the CONFIDANT Protocol
(Cooperation Of Nodes: Fairness In Dynamic Ad NeT
works), Sonja Buchegger, Jean-Yves Le Boudec
40/41
Thank you!
41/41