Title :
Detection of dishonest trust recommendations in mobile ad hoc networks
Author :
Zakirullah ; Islam, M. Hasan ; Khan, Adnan Ahmed
Author_Institution :
Dept. of Electr. & Comput. Eng., Center for Adv. Studies in Eng., Islamabad, Pakistan
Abstract :
Indirect trust based on recommendations from peer nodes forms an important component of trust management system in MANET. It can provide a node the confidence to interact with peer nodes. However this indirect trust is vulnerable to various types of attacks from dishonest recommenders. This paper proposes a scheme that removes the dishonest recommendations before utilizing the recommended trusts. Removing the dishonest recommendations will remove impact of dishonest recommendations on the indirect trust of a node. The mechanism is based on the dissimilarity function among the recommended trust for filtering out the dishonest recommendations. The recommendations that result in the highest dissimilarity are considered as malicious recommendations. The effectiveness of the proposed scheme is evaluated against bad mouthing, ballot stuffing and random opinion attacks. The results show that the scheme can effectively filter out the dishonest recommendations.
Keywords :
mobile ad hoc networks; recommender systems; telecommunication computing; trusted computing; MANET; dishonest trust recommendations; dissimilarity function; indirect trust; malicious recommendations; mobile ad hoc networks; trust management system; Filtering; Histograms; Mobile ad hoc networks; Peer-to-peer computing; Performance evaluation; Security; Smoothing methods; Bad Mouthing; Ballot Stuffing; Indirect Trust; MANET; Random Opinion Attack;
Conference_Titel :
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Conference_Location :
Hefei
Print_ISBN :
978-1-4799-2695-4
DOI :
10.1109/ICCCNT.2014.6962994