240 likes | 372 Views
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks. Junhai Luo 1,2 , Xue Liu 1 , Yi Zhang 3 ,Danxia Ye 2 ,Zhong Xu 1 1 McGill University 2 University of Electronic Science and Technology of China 3 University of California September 2008. Outline.
E N D
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo1,2, Xue Liu1 , Yi Zhang 3 ,Danxia Ye2 ,Zhong Xu1 1McGill University 2University of Electronic Science and Technology of China 3University of California September 2008
Outline • Motivations • Related Work • Architecture • Algorithm Realization • Performance Evaluation • Conclusion and Future Work
Motivations • MANETs characteristics: • Cooperative • Autonomous • Self-organized D j i S
PDA PDA Laptop computer Laptop computer Pen computer Motivations(cont.) • Low power • Multi-hop • Vulnerable to various attacks
Motivations(cont.) Why? • 1) High trust value =?High or correct recommendation to other nodes. • 2) Uncertain
Motivations(cont.) • Methods • Collaborative filtering • Fuzzy logic
Related Work • CONFIDANT [1] • DSR (Dynamic Source Routing) with reputation system • NUGLETs [2] • Virtual currency • SORI [3] • Secure and objective reputation scheme • CORE [4] • Collaborative observations and reputation mechanism • [1] S. Buchegger and J.-Y. L. Boudec, Performance analysis of the confidant protocol,” in MobiHoc ’02: Proceedings of the 3rd ACM international symposium on Mobile ad-hoc networking & computing. New York, NY, USA: ACM, 2002, pp. 226–236 • [2] L. Buttyan and J.-P. Hubaux, “Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks,” Tech. Rep., 2001 • [3] Q. He, D. Wu, and P. Khosla, “Sori: a secure and objective reputation based incentive scheme for ad-hoc networks,” Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, vol. 2, pp. 825–830 Vol.2, 21-25 March 2004. • [4] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks,” in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. Deventer, The Netherlands, The Netherlands: Kluwer, B.V., 2002, pp. 107–121.
Architecture j1 i j2 m … K jK How? Ri Rj Rjk,m Ri,m
AlgorithmRealization • Local trust Value • Collaborative filtering • Fuzzy trust recommendation
Algorithm Realization(cont.) • Local Trust Value • Neighbor monitoring[3] Number of packets forwarded by node m Number of packets Requested for Forwarding by node j
Algorithm Realization(cont.) • Collaborative Filtering • Similarity Functions • Cosine-Based Similarity • Correlation-Based Similarity • Adjusted Cosine Similarity
Algorithm Realization(cont.) • FuzzyMethod • Fuzzy Membership Function • Fuzzy Levels • Fuzzy Inference
Algorithm Realization(cont.) • Fuzzy Membership Function • Trapezoid Membership Function (TMF) Degree 1 a2 a1 a4 a3 0 TrustLevels
Algorithm Realization(cont.) • Fuzzy Levels
Algorithm Realization(cont.) • Fuzzy Inference • Inference rule : IF …THEN rule Forexample: IF temperature is very cold THEN turn off fan IF temperature is very hot THEN speed up fan
Algorithm Realization(cont.) Start Set node-nearest-neighbors Retrieve node's evaluation Calculate the correlation coefficient K Calculate similarity based on fuzzy reference Compute the trust recommendation End
Performance Evaluation • Evaluation Metrics • Mean Absolute Error (MAE): • Tri value of trust recommendation • Rri value of real evaluation • Average Packet Drop Ratio (APDR):
Performance Evaluation(cont.) • Evaluation Setup
Performance Evaluation(cont.) • Mean Absolute Error (MAE)
Performance Evaluation(cont.) • Average Packet Drop Ratio(APDR)
Conclusion and Future Work • A fuzzy trust recommendation based on collaborative filtering for MANETs. • Combining local trust and trust recommendation information based on collaborative filtering to allow nodes to represent and reason with uncertainty and imprecise information regarding other nodes' trust. • Some attack models will be done in the paper in the future.