[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1815396.1815543acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

PROTECT: proximity-based trust-advisor using encounters for mobile societies

Published: 28 June 2010 Publication History

Abstract

Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proximity, location and similarity based trust. Four new trust advisor filters are introduced - including encounter frequency, duration, behavior vectors and behavior matrices - and evaluated over an extensive set of real-world traces collected from a major university. Two sets of statistical analyses are performed; the first examines the underlying encounter relationships in mobile societies, and the second evaluates DTN routing in mobile peer-to-peer networks using trust and selfishness models. We find that for the analyzed trace, trust filters are stable in terms of growth with time (3 filters have close to 90% overlap of users over a period of 9 weeks) and the results produced by different filters are noticeably different. In our analysis for trust and selfishness model, our trust filters largely undo the effect of selfishness on the unreachability in a network. Thus improving the connectivity in a network with selfish nodes.
We hope that our initial promising results open the door for further research on proximity-based trust.

References

[1]
W. Hsu, D. Dutta, and A. Helmy, "Profile-cast: Behavior-aware mobile networking," in Proc. IEEE WCNC, Las Vegas, NV, March 2008.
[2]
C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, "Gangs: gather, authenticate 'n group securely," in MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008.
[3]
J. Manweiler, R. Scudellari, and L. P. Cox, "SMILE: encounter-based trust for mobile social services," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 246--255.
[4]
S. Zhong, J. Chen, and R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," in Proceedings of IEEE INFOCOM, 2002.
[5]
L. Butty-Ãąn and J.-P. Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks," ETH, Tech. Rep., 2001.
[6]
S. Buchegger and J.-Y. Le Boudec, "Self-Policing Mobile Ad-Hoc Networks by Reputation," IEEE Communication Magazine, vol. 43, no. 7, p. 101, 2005.
[7]
A Robust Reputation System for Mobile Ad-hoc Networks, 2003.
[8]
V. S. Pavan, V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks," in In Proceedings of IEEE Infocom, 2003.
[9]
E. Altman, A. A. Kherani, P. Michiardi, R. Molva, P. M. Ãİ, and R. M. Ãİ, "Non-cooperative forwarding in ad-hoc networks," In Proceedings of the International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC, Tech. Rep., 2004.
[10]
J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring, "Modelling incentives for collaboration in mobile ad hoc networks," Performance Evaluation, vol. 57, no. 4, pp. 427--439, 2004.
[11]
E. Altman, "Competition and cooperation between nodes in delay tolerant networks with two hop routing." in NET-COOP, ser. Lecture Notes in Computer Science, vol. 5894. Springer, 2009, pp. 264--278.
[12]
A. Panagakis, A. Vaios, and I. Stavrakakis, "On the Effects of Cooperation in DTNs," in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on, Jan. 2007, pp. 1--6.
[13]
L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda, "Barter-based cooperation in delay-tolerant personal wireless networks," in World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2007, 2007.
[14]
P. Michiardi, P. Michiardi, and R. Molva, "Simulation-based analysis of security exposures in mobile ad hoc networks," in in Mobile Ad Hoc Networks. European Wireless Conference, 2002.
[15]
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Mobicom. ACM, 2000, pp. 255--265.
[16]
P. Hwang and W. P. Burgers, "Properties of trust: An analytical view," Organizational Behavior and Human Decision Processes, vol. 69, no. 1, pp. 67--73, January 1997.
[17]
Y.-H. Lin, A. Studer, H.-C. Hsiao, J. M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, "Spate: small-group pki-less authenticated trust establishment," in MobiSys '09: Proceedings of the 7th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2009, pp. 1--14.
[18]
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing Is Believing: using camera phones for human authentication," Int. J. Secur. Netw., vol. 4, no. 1/2, pp. 43--56, 2009.
[19]
W. jen Hsu and A. Helmy, "On nodal encounter patterns in wireless lan traces," in IEEE Intl. Workshop on Wireless Network Measurement (WiNMee), 2006.
[20]
M. Mcpherson, L. S. Lovin, and J. M. Cook, "Birds of a feather: Homophily in social networks," Annual Review of Sociology, vol. 27, no. 1, pp. 415--444, 2001.
[21]
W. Hsu, D. Dutta, and A. Helmy, "Mining behavioral groups in large wireless lans," in MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. New York, NY, USA: ACM, 2007, pp. 338--341.
[22]
A. Dua, N. Bulusu, W. chang Feng, and W. Hu, "Towards trustworthy participatory sensing," in Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec 2009), 2009.
[23]
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, "Toward trustworthy mobile sensing," in HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010, pp. 31--36.
[24]
A. Vahdat and D. Becker, "Epidemic routing for partially-connected ad hoc networks," Duke University, Tech. Rep., 2000.
[25]
S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, "Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks," in IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN), in conjunction with IEEE IPCCC, 2004, pp. 14--17.

Cited By

View all
  • (2019)Vulnerability Assessment and Classification based on Influence Metrics in Mobile Social NetworksProceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access10.1145/3345770.3356737(9-16)Online publication date: 25-Nov-2019
  • (2018)EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection2018 IEEE International Conference on Communications (ICC)10.1109/ICC.2018.8422886(1-6)Online publication date: May-2018
  • (2017)A trust-based approach for securing data communication in delay tolerant networksInternational Journal of Information and Computer Security10.5555/3160694.31606989:4(324-336)Online publication date: 1-Jan-2017
  • Show More Cited By

Index Terms

  1. PROTECT: proximity-based trust-advisor using encounters for mobile societies

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
        June 2010
        1371 pages
        ISBN:9781450300629
        DOI:10.1145/1815396
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        • Computer and Information Society

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 28 June 2010

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. effects of trust
        2. mobile networks
        3. selfishness
        4. trust advisor
        5. wireless LAN

        Qualifiers

        • Research-article

        Conference

        IWCMC '10
        Sponsor:

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)6
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 24 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2019)Vulnerability Assessment and Classification based on Influence Metrics in Mobile Social NetworksProceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access10.1145/3345770.3356737(9-16)Online publication date: 25-Nov-2019
        • (2018)EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection2018 IEEE International Conference on Communications (ICC)10.1109/ICC.2018.8422886(1-6)Online publication date: May-2018
        • (2017)A trust-based approach for securing data communication in delay tolerant networksInternational Journal of Information and Computer Security10.5555/3160694.31606989:4(324-336)Online publication date: 1-Jan-2017
        • (2017)In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.258(2537-2542)Online publication date: Jun-2017
        • (2014)TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)10.1109/ISSNIP.2014.6827614(1-6)Online publication date: Apr-2014
        • (2013)Comparing wireless network usageProceedings of the 19th annual international conference on Mobile computing & networking10.1145/2500423.2504586(243-246)Online publication date: 30-Sep-2013
        • (2013)Decentralized Trust Driven Access Control for Mobile Content SharingProceedings of the 2013 IEEE International Congress on Big Data10.1109/BigData.Congress.2013.40(239-246)Online publication date: 27-Jun-2013
        • (2013)A Novel Proximity Based Trust Model for Opportunistic NetworksProceedings of the 2013 International Conference on Availability, Reliability and Security10.1109/ARES.2013.37(281-284)Online publication date: 2-Sep-2013
        • (2012)Gauging human mobility characteristics and its impact on mobile routing performanceInternational Journal of Sensor Networks10.1504/IJSNET.2012.04634811:3(179-191)Online publication date: 1-Apr-2012
        • (2012)Discovering trustworthy social spacesProceedings of the Third International Workshop on Sensing Applications on Mobile Phones10.1145/2389148.2389155(1-5)Online publication date: 6-Nov-2012
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media