[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Trust Management for Defending On-Off Attacks

Published: 01 April 2015 Publication History

Abstract

A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust. However, if a malicious node tries to disguise its malicious behaviors as unintentional temporary errors, the malicious node may be given more opportunities to attack the system by disturbing the redemption scheme. Existing trust management schemes that employ redemption schemes fail to discriminate between temporary errors and disguised malicious behaviors in which the attacker cleverly behaves well and badly alternatively. In this paper, we present the vulnerabilities of existing redemption schemes, and describe a new trust management and redemption scheme that can discriminate between temporary errors and disguised malicious behaviors with a flexible design. We show the analytical results of the trust management scheme, and demonstrate the advantages of the proposed scheme with simulation conducted in a Wireless Sensor Network.

References

[1]
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey ”, Comput. Netw., vol. 38, no. 4, pp. 393– 422, 2002.
[2]
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., 2000, pp. 255– 265.
[3]
K. Paul, and D. Westhoff, “Context aware detection of selfish nodes in DSR based ad-hoc networks”, Proc. IEEE Global Telecommun. Conf., 2002, vol. 1, pp. 178 –182.
[4]
S. Buchegger, and J. Le Boudec, “A robust reputation system for mobile ad-hoc networks”, Proc. P2PEcon Workshop, Jun. 2004, http://www.eecs.harvard.edu/p2pecon/program.html.
[5]
P. Michiardi, and R. Molva, “Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. Multimedia Security: Adv. Commun. Multimedia Security , 2002, pp. 107–121.
[6]
S. Bansal, and M. Baker, “Observation-based cooperation enforcement in ad hoc networks”, Technical report, Stanford University, NI/0307012, 2003.
[7]
Q. He, D. Wu, and P. Khosla, “SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks”, Proc. IEEE Wireless Commun. Netw. Conf., 2004, vol. 2, pp. 825 –830.
[8]
Y. ChaeRedeemable reputation based secure routing protocol for wireless sensor networks, Master of Sci., Dept. Comput. Sci. Statist., Univ. Rhode Island, Kingston, RI, USA, Tech. Rep. TR12-331, 2012.
[9]
C. Karlof, and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures”, Ad Hoc Netw., vol. 1, no. 2/3, pp. 293– 315, 2003.
[10]
J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, “Trust management systems for wireless sensor networks: Best practices”, Comput. Commun., vol. 33, no. 9, pp. 1086– 1093, 2010.
[11]
A. Jøsang, and R. Ismail, “The beta reputation system ”, Proc. 15th Bled Electron. Commerce Conf., 2002, pp. 41–55.
[12]
S. Buchegger, and J. Le Boudec, “Performance analysis of the CONFIDANT protocol”, Proc. Proc. 6th Annu. Int. Symp. Mobile Ad Hoc Netw. Comput., 2002, pp. 226 –236.
[13]
S. Buchegger, and J. Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems”, IEEE Commun. Mag., vol. 43, no. 7, pp. 101– 107, Jul. 2005.
[14]
S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based framework for high integrity sensor networks”, ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1– 37, 2008.
[15]
R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, and Y.-J. Song, “Group-based trust management scheme for clustered wireless sensor networks”, IEEE Trans. Parallel Distrib. Syst, vol. 20, no. 11, pp. 1698 –1712, Nov.  2009.
[16]
Y. Sun, Z. Han, W. Yu, and K. Liu, “A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks”, Proc. IEEE Conf. Comput. Commun., 2006, vol. 6, pp. 1 –13.
[17]
H. Chen, H. Wu, J. Hu, and C. Gao, “Event-based trust framework model in wireless sensor networks”, Proc. Int. Conf. Netw., Archit., Storage, 2008, pp. 359–364.
[18]
H. Bathla, and K. Lakhani, “A novel method for intrusion detection system to enhance security in ad hoc network”, J. Comput., vol. 2, no. 5, May 2010, ISSN 2151-9617.
[19]
A. Trivedi, R. Kapoor, R. Arora, S. Sanyal, and S. Sanyal, “RISM – Reputation based intrusion detection system for mobile ad hoc networks”, 3rd International Conference on Computers and Devices for Communication (CODEC-06), December 18-20, 2006, pp. 234–237.
[20]
M. Jakobsson, J.-P. Hubaux, and L. Buttyán, “A micro-payment scheme encouraging collaboration in multi-hop cellular networks”, Proc. Financial Cryptography, 2003, pp. 15–33.
[21]
X. Mao, and J. McNair, “Effect of on/off misbehavior on overhearing based cooperation scheme for MANET”, Proc. Military Commun. Conf., 2010, pp. 1086–1091.
[22]
I. S. Abuhaiba, and H. B. Hubboub, “Reinforcement swap attack against directed diffusion in wireless sensor networks”, Int. J. Comput. Netw. Inf. Security, vol. 5, pp. 13–24, 2013.
[23]
G. Maciá-Fernández, J. Díaz-Verdejo, P. García-Teodoro, and F. de Toro-Negro, “LoRDAS: A low-rate DoS attack against application servers”, Proc. 2nd Int. Conf. Critical Inf. Infrastructures Security, 2008, pp. 197 –209.
[24]
T. Qin, H. Yu, C. Leung, Z. Shen, and C. Miao, “Towards a trust aware cognitive radio architecture”, ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 13, no. 2, pp. 86–95, 2009.
[25]
C.-L. Cheng, X.-L. Xu, and B.-Z. Gao, “METrust: A mutual evaluation-based trust model for P2P networks”, Int. J. Autom. Comput., vol. 9, no. 1, pp. 63– 71, 2012.
[26]
D. M. Shila, Y. Cheng, and T. Anjali, “Mitigating selective forwarding attacks with a channel-aware approach in WMNs”, IEEE Trans. Wireless Commun., vol. 9, no. 5, pp. 1661 –1675, May 2010.
[27]
J. Wang, Y. Liu, and Y. Jiao, “Building a trusted route in a mobile ad hoc network considering communication reliability and path length”, J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1138 –1149, 2011.
[28]
B.-J. Chang, and S.-L. Kuo, “Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs”, IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1846 –1863, May 2009.
[29]
Z. Liu, S. S. Yau, D. Peng, and Y. Yin, “A flexible trust model for distributed service infrastructures”, Proc. IEEE Int. Symp. Object Oriented Real-Time Distrib. Comput., 2008, pp. 108 –115.
[30]
L. C. DiPippo, Y. Sun, and K. Rahn Jr.“Secure adaptive routing protocol for wireless sensor networks,” Dept. Comput. Sci. Univ. Rhode Island, Kingston, RI, USA, Tech. Rep. TR10-329, 2010.
[31]
G. Karame, I. Christou, and T. Dimitriou, “A secure hybrid reputation management system for super-peer networks”, Proc. 5th IEEE Consumer Commun. Netw. Conf., 2008, pp. 495– 499.
[32]
J. Mundinger, and J. Le Boudec, “Analysis of a reputation system for mobile ad-hoc networks with liars”, Perform. Eval., vol. 65, no. 3, pp. 212– 226, 2008.
[33]
J. Jaramillo, and R. Srikant, “DARWIN: Distributed and adaptive reputation mechanism for wireless ad-hoc networks”, Proc. 13th Annu. Int. Conf. Mobile Comput. Netw., 2007, pp. 87– 98.
[34]
S. Buchegger, and J. Y. Le Boudec, “Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks”, Proc. 10th Euromicro Workshop Parallel, Distrib. Netw.-Based Process., 2002, pp. 403–410.
[35]
M. Piatek, T. Isdal, A. Krishnamurthy, and T. Anderson, “One hop reputations for peer to peer file sharing workloads”, Proc. Symp. Netw. Syst. Design Implementation, 2008, vol. 8, pp. 1–14.
[36]
H. Xia, Z. Jia, L. Ju, X. Li, and Y. Zhu, “A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules”, Proc. IEEE/ACM Green Comput. Commun., 2011, pp. 124–130.
[37]
J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: analysis & defenses”, Proc. Inf. Process. Sensor Netw., 2004, pp. 259–268 .
[38]
P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: Accurate and scalable simulation of entire TinyOS applications”, Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., 2003, pp. 126– 137.

Cited By

View all

Index Terms

  1. Trust Management for Defending On-Off Attacks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE Transactions on Parallel and Distributed Systems
        IEEE Transactions on Parallel and Distributed Systems  Volume 26, Issue 4
        April 2015
        292 pages

        Publisher

        IEEE Press

        Publication History

        Published: 01 April 2015

        Author Tags

        1. distributed system
        2. Trust
        3. redemption
        4. recover
        5. manage
        6. collaborate
        7. On-off attack
        8. wireless sensor network
        9. ad-hoc

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management SystemsProceedings of the 2024 Cyber Security in CarS Workshop10.1145/3689936.3694691(61-75)Online publication date: 20-Nov-2024
        • (2024)GD3NInformation Sciences: an International Journal10.1016/j.ins.2024.120375665:COnline publication date: 1-Apr-2024
        • (2023)IoT trust and reputation: a survey and taxonomyJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00416-812:1Online publication date: 22-Mar-2023
        • (2023)Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automationInternational Journal of Information Security10.1007/s10207-023-00669-z22:4(833-867)Online publication date: 17-Feb-2023
        • (2021)MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networksEURASIP Journal on Wireless Communications and Networking10.1186/s13638-020-01884-12021:1Online publication date: 22-Jan-2021
        • (2021)Research on Task Scheduling Based on Particle Swarm Optimization Simulated Annealing Algorithm in Hybrid Cloud EnvironmentProceedings of the 6th International Conference on Intelligent Information Processing10.1145/3480571.3480631(324-330)Online publication date: 29-Jul-2021
        • (2021)Trust Models in IoT-enabled WSN: A reviewInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460748(153-159)Online publication date: 5-Apr-2021
        • (2020)Trust-Based Attack and Defense in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2020/26435462020Online publication date: 1-Jan-2020
        • (2020)A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation AttacksACM Transactions on Sensor Networks10.1145/339205816:3(1-26)Online publication date: 25-May-2020
        • (2020)Decentralized Trust ManagementACM Computing Surveys10.1145/336216853:1(1-33)Online publication date: 6-Feb-2020
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media